The cybercriminal organization behind the InterPlanetary Storm malware has released a new variant into...
Continue readingResearch
Articles from our security researchers
Anatomy of a Sentinel catch
Check out this detailed breakdown of a spear-phishing and credential harvesting attack stopped by...
Continue readingThreat Spotlight: Ransomware
Cybercriminals are targeting government, healthcare, and education organizations with ransomware. Although ransomware has been...
Continue readingThreat Spotlight: Malicious accounts in business email compromise
Beware of cybercriminals who create accounts with legitimate email services and use them to...
Continue readingReport: Insights into attacker activity in compromised email accounts
A specialized economy is emerging around email account takeover as cybercriminals find new ways...
Continue readingThreat Spotlight: New cryptominer malware variant
A new variant of the cryptominer malware known as Golang is targeting both Windows...
Continue readingReport: Secure SD-WAN: The Launch Pad into Cloud
As more and more organizations make the move to the public cloud, security continues...
Continue readingThreat Spotlight: Form-based attacks
A new type of brand impersonation attack is disproportionately using Google-branded sites to trick...
Continue reading