Estimated reading time: 4 minutes
IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all...Estimated reading time: 3 minutes
Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...Estimated reading time: 3 minutes
Compliance, in the simplest possible terms, refers to integrating certain industrial standards based on specific requirements. While regulatory compliance can easily impose additional costs to the IT networks and security systems, the costs and repercussions for not complying with...Estimated reading time: 3 minutes
Cyber-attacks are constantly posing threats of significant proportions, and it’s important to consider their evolving nature while setting up a response plan. Be it dealing with the growing economic espionage or acts of internal and external corruption; companies often...