Network Infrastructure

October 4, 2021

T-Mobile Breach Exposed the Personal Data of 54 Million Customers

The T-Mobile data breach in August 2021 was massive. Find out what data was stolen, what T-Mobile is doing to help customers affected by the breach, […]
September 27, 2021

Phishing Deep Dive: Classic Phishing

Classic phishing is the most common type of phishing. Discover what it is and how to protect your company from this type of attack.
February 4, 2021

5G’s Market Surge and the Race to Build

The race to rollout 5G networks has been suspended this year, due to COVID-19, but currently 5G is making it’s come back and stronger than ever.
November 30, 2020

What You Need to Know about the MalLocker.B Mobile Ransomware

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what […]
August 31, 2020

What You Need to Know about the Zero Trust Model

Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here […]
January 20, 2020

Hackers’ Newest Trick Hides Ransomware While It Encrypts Victims’ Files

A ransomware variant known as Snatch is now more dangerous than ever. Learn about the newest trick that cybercriminals are using to make this ransomware harder […]
September 16, 2019

Critical Security Vulnerability Allows Hackers to Take Over Cisco Routers

A severe security vulnerability in several types of Cisco routers allows cybercriminals to gain full control of the devices. Discover which routers are affected and what […]
June 6, 2019

Software Supply Chain Attacks Are on the Rise

Software supply chain attacks are becoming more widespread. Learn what they are and how they occur so you can develop a strategy to help manage the […]
May 28, 2019

All It Took Was 52 Seconds for Hackers to Attack a Poorly Secured Server

Researchers set up honeypots to learn how cybercriminals find and attack poorly protected Secure Shell (SSH)-enabled servers. Learn what the researchers found so you can protect […]