Remove Blog Remove Cloud Migration Remove Cybersecurity Remove Threat Detection
article thumbnail

Anton’s Security Blog Quarterly Q2 2022

Anton on Security

Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is Threat Detection Hard?” “A

article thumbnail

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

CyberSecurity Insiders

Evades Malicious Link Analysis: These threats evade malicious link analysis engines traditionally implemented in the email path where links can be analyzed before arriving at the user. For more information on HEAT, please visit our blog, “ Too Hot to Handle.”. About Menlo Security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to shift into a new approach to cybersecurity asset management

CyberSecurity Insiders

This blog was written by an independent guest blogger. Because of this, companies in all industries were faced with an array of new technologies like cloud and containers that support the shift to edge computing and remote workers. What is cybersecurity asset management. Why is cybersecurity asset management important.

article thumbnail

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide

Security Affairs

Group-IB, a Singapore-based cybersecurity company , has identified a series of sophisticated successful phishing attacks against the management and executives of more than 150 companies around the world. It stops any automated threat detection efforts to URLs visited by the targets.