Invisible aka Fileless Malware — Malware of the Month, June 2019

Invisible aka Fileless Malware — Malware of the Month, June 2019

Invisible malware is a type of Fileless malware that comes with zero footprint and is responsible for an increasing number of endpoint or zero-day attacks. It typically resides in memory, comes packaged as firmware or lives in your Basic Input/Output System (BIOS) - thus bypassing anti-virus software. It truly is ... Read More
Cross-Site Scripting (XSS) — Web-based Application Security, Part 3

Cross-Site Scripting (XSS) — Web-based Application Security, Part 3

Cross-site scripting (XSS) is a technique in which malicious scripts are stored on and unknowingly retrieved from trusted websites by unsuspecting victims. Learn how to safeguard against this threat to your sensitive data ... Read More
Emotet: The Banking Trojan — Malware of the Month, May 2019

Emotet: The Banking Trojan — Malware of the Month, May 2019

Emotet — a banking trojan malware program that the Center for Internet Security (CIS) calls one of the “most costly and destructive malware" — is Spanning's first spotlight in a new series titled "Malware of the Month." Every month, Spanning will take a closer look at a new or existing ... Read More
The Year of GDPR

The Year of GDPR

The EU General Data Protection Regulation (GDPR) came into effect on May 25, 2018. With nearly a year under its belt, Spanning takes a look at the major penalties & overall repercussions of GDPR and examines what we can learn from them ... Read More
Web-based Application Security: Part 2: Cross-Site Forgery

Web-based Application Security: Part 2: Cross-Site Forgery

Cross-site forgery (CSRF) is a malicious technique designed to take advantage of unsuspecting users who are actively logged into web applications. Learn more about this threat to your data and how to safeguard against it ... Read More
Web-based Application Security Part 1: Open Redirection Vulnerability

Web-based Application Security Part 1: Open Redirection Vulnerability

Understanding open redirection vulnerabilities is key to detecting them and protecting your organization’s data. Without proper validation, attackers can redirect victims from trusted to malicious sites, or use forwards to access unauthorized pages ... Read More
Employee Cybersecurity Survey Infographic

[Infographic] Employees are Cyber Secure in Theory, But Not in Practice

| | Compliance
Cybersecurity is a top priority for organizations. All it takes to infect a network or steal valuable data, is one wrong click by an employee. While employees seem to have good knowledge of basic cybersecurity practices, there are considerable security blind spots which leave the employee and organization vulnerable to ... Read More
Spear-Phishing: The Smart Malware

Spear-Phishing: The Smart Malware

| | Compliance
"Spear-phishing" is a smart phishing mechanism that is an increasingly popular and virulent malware vector. Understand its devastating effect on organizations worldwide and get pointers to safeguard your organization against it ... Read More
Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery: Your Organization’s Safety Plan

From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization's best defense is to plan for business continuity and disaster recovery by using processes that guide organizations to possibly prevent and/or ... Read More
Gone Phishing

Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data

Phishing is a critical security issue that can trick even the most diligent, security-minded users. How do you protect your organization from being another phish in the sea? Let’s start by understanding how phishing works and then move on to practical pointers to avoiding biting the bait ... Read More
Loading...