Law Firms’ Risk of Emotet Malware Infection

| | Blog
The American Bar Association’s 2019 Legal Technology Survey Report states that 36% of surveyed attorneys claimed that their firms’ systems had been infected with viruses, spyware, and/or malware. The legal industry serves as a particularly attractive target to malicious actors due to databases that host troves of sensitive client information ... Read More
Neutralize Weaponized Files with Positive Selection Technology

Surprise! Phishing tests using file attachments have highest rate of failure

| | Blog
New research by Proofpoint is out, and the results are eye-opening. Their annual report, “State of the Phish,“ highlights that malicious file attachments are a highly effective form of malware delivery that is often underestimated by information security teams worldwide. Malicious file attachments are evading notice 88% of organizations surveyed ... Read More
A picture containing racquetball, game  Description automatically generated

How to Build a Company Culture of Leadership

| | Blog
By: Yehuda Neeman, VP R&D at Votiro Building an organization’s culture is an ongoing process. It requires a constant investment of time, effort, and ongoing evaluation of what needs to be improved, while keeping an eye on the desired goal: a company culture that supports the organization’s success and acts ... Read More

The Federal Government: Ransomware’s Most Desirable Target

| | Blog
As threat actors enhance their arsenals and develop more strategic tactics to target government agencies, how do these agencies assess their risk? More importantly, how can we protect these vulnerable ecosystems? The post The Federal Government: Ransomware’s Most Desirable Target appeared first on Votiro ... Read More

5 Psychological Tricks Hackers Use to Trick You Into Downloading Files

| | Blog
We’ve all been there. It’s your busiest time of day, and you’re multi-tasking like a champ. You glance at a new email that just hit your inbox—something about a password reset from the company administrator—CLICK and….oops. Welcome to email phishing schemes 2020. Cyber criminals are devising increasingly underhanded and clever ... Read More
A Look at the 2020 Garmin WastedLocker Ransomware Attack

A Look at the 2020 Garmin WastedLocker Ransomware Attack

| | Blog
On July 23, 2020, American GPS and fitness-tracker company Garmin was hit by a ransomware attack that caused widespread disruption to the company’s online services and affected millions of users who rely on the technology in their daily lives. The attack encrypted Garmin’s internal network and caused the company to ... Read More
When Job Offers Lead to Cyber Disaster: The Latest LinkedIn Phishing Campaign

When Job Offers Lead to Cyber Disaster: The Latest LinkedIn Phishing Campaign

| | Blog
Job security has taken on a new meaning, with a new cyber-espionage attempt that has recently come to light. Between September to December 2019, employees at select aerospace and military organizations in Europe and the Middle East were targeted with a LinkedIn phishing campaign. The campaign’s malevolent goal was to ... Read More

Object Linking and Embedding Technology: How the Highly Exploited Vulnerability Poses a Major Cybersecurity Threat

| | Blog
Object Linking and Embedding Technology (OLE) enables Microsoft users to connect collateral created in other software applications into Microsoft files. OLE Technology can enhance user experience and productivity through their ability to create compound documents that support a host of software applications, such as Microsoft Windows applications, Corel WordPerfect, Adobe ... Read More

Votiro Partners With M.Tech To Expand Access To Positive Selection Technology in Asia-Pacific Region

| | Blog
New Addition to M.Tech’s Portfolio Advances Votiro’s Secure File Gateway Throughout APAC region to Mitigate Risk of File-Borne Threats Tel Aviv, Israel (July 15, 2020) — Votiro, a global leader in positive selection technology™, today announced a partnership with M.Tech, the leading cybersecurity and network solutions provider, to expand access ... Read More

Browser Isolation Evasion and Exploits: How to Fill the Gap in Browser Isolation

| | Blog
Security incidents can cause enterprises severe reputational and financial damage. Many of these originate due to users downloading malicious files, clicking on risky links, and engaging with online advertisements containing malware, also known as malvertising campaigns.  Unfortunately, preventative measures, such as limiting employee web browsing come at a cost, as ... Read More