Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

Digital criminals use various techniques to breach organizations’ computer systems. One method that continues to be popular among cybercriminals is watering hole attacks. The name is derived from how predatory animals tend to lurk around watering… Continue reading Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

InvisiMole Spyware: Sophisticated Tool for Targeted Cyber Espionage

A previously unknown piece of complex malware with spying capabilities was recently discovered by researchers at cybersecurity firm ESET. The spyware is dubbed InvisiMole and is regarded as an advanced cyber espionage tool most likely designed for atta… Continue reading InvisiMole Spyware: Sophisticated Tool for Targeted Cyber Espionage