Posts by author
Panda Security
How to Identify a Business Email Compromise Attack
Business email compromise attacks have skyrocketed over the last few years. Hackers use this strategy to target corporate or publicly available email accounts of executives…
US Postal Service exposed the details of 60 million people
A few weeks ago the United States Postal Service (USPS) patched up a vulnerability that has been revealing the details of sixty million people.
How to detect a critical security incident?
There are several ways to detect the whether the company is facing critical security incidents. With these measures their relevance can be evaluated.
What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…
Study: Americans Don’t Understand Basic Internet Safety
In our modern world, the internet is integral to daily life. The internet stores our files connects us with others and holds sensitive data like bank account credentials. So why don’t we treat internet security like we would real-life safety?
The risk of using phone numbers as authenticators for sensitive information
Find out how using mobile phones to authenticate sensitive information and accounts can pose a risk to your company’s cybersecurity.
Beware this malware: it can even survive operating systems being reinstalledÂ
LoJax is a piece of malware that is able to survive an operating system being reinstalled making it especially dangerous for companies and institutions.