Novel Google Cloud RAT Uses Calendar Events for C2 Cybercriminals are abusing legitimate functions within cloud services, and providers can't totally stop them, especially when it comes to innovative approaches like this.
Securing Remote Workers Through Zero Trust Dark Reading’s special report look at how enterprises turning to zero trust to harden the security of their remote workforce. Challenges are steep.
LATEST FROM DR TECHNOLOGY
Software Complexity Bedevils Mainframe Security The high-performance and resilient platforms satisfy critical roles, but software complexity and the graying of the specialist workforce are creating security challenges.
Iran-Linked Agrius APT Group Targets Israeli Education, Tech Sectors The attackers also use custom wipers to cover their tracks and bypass EDR.