• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: ransomware

Human hand with magnifying glass found spam email with skull and cross bones computer virus on laptop computer. ZLoader attack

How to Identify and Defend Against ZLoader Attacks

Microsoft is warning of ZLoader attacks— here's how to spot it and defend against the disabling security and antivirus trojan.

April 14, 2022 TD Staff Leave a Comment

Microsoft 365 Defender Threat Intelligence Team has released details and a warning about the ZLoader Trojan. The ZLoader trojan, known for its ability to evolve and change from campaign-to-campaign, is said to be derived from the Zeus banking trojan first discovered in 2007. Microsoft says ZLoader is an attacker’s tool of choice— it has defense […]

Read More

cloud automation illustration

What Is Cloud Automation?: a Quick, All-Around Guide

A guide to cloud automation: what it is, the different types, benefits and tools for successful orchestration.

April 14, 2022 Grace Lau Leave a Comment

A guide to cloud automation: what it is, the different types, benefits and tools for successful orchestration.

Read More

Log4j, Older Vulnerabilities, CISA KEV

Malware Developers Are Targeting These 10 2021 Security Bugs

Research from Skybox Security finds that security 2021 bugs in Log4j and Exchange Server are the most targeted by malware developers.

April 13, 2022 Zachary Comeau Leave a Comment

Security analysts at Skybox Security uncovered a 42% increase in new ransomware programs targeting known vulnerabilities last year, including critical vulnerabilities discovered in Log4j and Exchange Server. The San Jose, Calif. cybersecurity company’s 2022 Vulnerability and Trends Report, released this week, details how quickly hackers capitalize on new security bugs and continue to reduce the […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Supply Chain Attacks Jump 51% In Second Half of 2021

Malicious actors are increasingly attacking the software supply chain, leading to renewed calls for supplier transparency.

April 12, 2022 Zachary Comeau Leave a Comment

Recent IT supply chain attacks such as the SolarWinds compromise, ransomware campaign that leveraged the Kaseya VSA platform or mass exploitation of the Log4j vulnerabilities have renewed focus on such attacks, which NCC Group says increased by 51% in the last half of 2021. The consulting and managed services firm’s global survey of 1,400 cybersecurity […]

Read More

Microsoft Security RSA Conference

Microsoft’s New Defender for Endpoint for Windows Sever 2012 R2, 2016 Now Available

New prevention, detection and response capabilities that were previously only available on Windows Server 2019 and later now available.

April 12, 2022 Zachary Comeau Leave a Comment

Microsoft’s new unified Defender for Endpoint solution for Windows Server 2012 R2 and Windows Server 2016 is now generally available. According to Microsoft, this adds new prevention, detection and response capabilities to Defender for Endpoint on those versions that were previously only available on Windows Server 2019 and later. The new unified Defender reduces complexity […]

Read More

HelpSystems Acquires Terranova Security to Aid Global Customers in Building Localized Employee Security Awareness Training

April 8, 2022 TechDecisions Staff Leave a Comment

Terranova helps users spot email phishing attempts and other cyberattacks through education and simulation available in 40+ languages MINNEAPOLIS–(BUSINESS WIRE)–HelpSystems announced today the acquisition of Terranova Security, a leader in global phishing simulation and security awareness training. Available in more than 40 languages, Terranova’s platform and content incorporates gamification techniques to increase engagement and knowledge […]

Read More

BakerHostetler Launches 2022 Data Security Incident Response Report — Resilience and Perseverance

April 7, 2022 TechDecisions Staff Leave a Comment

WASHINGTON–(BUSINESS WIRE)–Here are key takeaways from BakerHostetler’s 2022 Data Security Incident Response Report issued April 7th: Ransomware remained the most prevalent and impactful type of data security incident. Investments in security enhancements and business continuity practices are making companies more resilient and less likely to choose to pay, driving down the average ransom payment amount. […]

Read More

Cynet Announces Results in 2022 MITRE Engenuity ATT&CK® Enterprise Evaluations

April 1, 2022 TechDecisions Staff Leave a Comment

ATT&CK Evaluations Emulate Wizard Spider and Sandworm Threat Groups BOSTON–(BUSINESS WIRE)–Cynet, the world’s first autonomous breach protection platform, today announced the results of its completed MITRE Engenuity ATT&CK Evaluation for the Cynet 360 AutoXDR™ platform. This round of independent ATT&CK Evaluations for enterprise cybersecurity solutions emulated the Wizard Spider and Sandworm threat groups, highlighting results […]

Read More

MITRE Engenuity ATT&CK® Evaluations Announces Results from Fourth Round of Enterprise Evaluations

March 31, 2022 TechDecisions Staff Leave a Comment

ATT&CK Evaluations Emulate Wizard Spider and Sandworm Threat Groups MCLEAN, Va., & BEDFORD, Mass.–(BUSINESS WIRE)–MITRE Engenuity ATT&CK® Evaluations (Evals), a program of MITRE Engenuity™, MITRE’s tech foundation for public good, today released its fourth round of independent ATT&CK Evaluations for enterprise cybersecurity solutions, highlighting results across 30 vendors. MITRE Engenuity helps government and industry combat […]

Read More

zoom chat leader, Enterprise Sound Bar Collaboration Kit, videoconferencing, cybersecurity

Must-Have Cybersecurity Features for Videoconferencing

Videoconferencing platforms are emerging as a new target for cyberattacks. Here are some cybersecurity actions to take to secure your calls.

March 30, 2022 TD Staff Leave a Comment

George Waller, EVP and co-founder of StrikeForce Technologies, an entrepreneur and technologist with over two decades in the cybersecurity and computer industries offers insights into must have cybersecurity features for videoconferencing and how we should be thinking about meetings in the future. Q: What are the top cybersecurity and data privacy concerns with general purpose […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • Interim pages omitted …
  • Page 56
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.