Simplified example of a web directory structure.

Directory Traversal — Web-based Application Security, Part 8

| | Cloud and Data Security
Directory traversal is a web application security vulnerability that allows unauthorized users to access files from different folders or directories that they would otherwise be restricted from accessing ... Read More
Mobile Malware: What Makes It Dangerous?

Mobile Malware: What Makes It Dangerous?

| | Cloud and Data Security
Cybercriminals are using mobile malware to get their hands on business data stored on your smartphone. Learn all about the types of mobile malware out there and what protection measures you can take to repel them ... Read More
Spanning Release Notes: G Suite Backup with Integrated Dark Web Monitoring

Spanning Release Notes: G Suite Backup with Integrated Dark Web Monitoring

Spanning Backup for G Suite with Dark Web Monitoring provides complete front-end and back-end G Suite protection – secure credentials – secure data ... Read More
A simple diagram showing how Denial-of-service attacks work.

Denial-of-Service (DoS) Attacks — Web-based Application Security, Part 7

A Denial-of-Service (DoS) attack is when legitimate users are unable to access a network. Learn how they work and how to protect against them ... Read More
How to Prepare for Salesforce Data Recovery Service End-Of-Life

How to Prepare for Salesforce Data Recovery Service End-Of-Life

| | Backup, Industry, Salesforce
The Salesforce Data Recovery Service End-of-Life will occur on July 31, 2020. Learn what the retirement of this feature means for administrators and how they can prepare for it ... Read More
Insecure Direct Object Reference in 8 minutes

Insecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6

| | Cloud and Data Security
Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and how to protect against them ... Read More
A themed image for Ryuk Ransomware; a book with the Ryuk character's face on the front and binary code on the back.

Ryuk Ransomware — Malware of the Month, January 2020

In the world of malware, Ryuk ransomware has gone from a rookie to a pro at a disturbing speed. Here we take a look at what Ryuk ransomware is, how it spreads, and how to protect your business from it ... Read More
Dridex — Malware of the Month, December 2019

Dridex — Malware of the Month, December 2019

Dridex — a malware specifically designed to attack financial services organizations and banks — is Spanning's Malware of the Month for December 2019. Learn how it has evolved and resulted in the theft of hundreds of millions of dollars from institutions in the form of fraudulent transactions ... Read More
Mark Zuckerberg ‘deepfake’ will remain online

Deepfake: The AI Endangering Your Cybersecurity 

| | Cloud and Data Security
How dangerous is deepfake to cybersecurity? The AI-based forgery is creating fear among businesses due to its growing popularity among cybercriminals ... Read More
Zeus Virus AKA Zbot – Malware of the Month, November 2019

Zeus Virus AKA Zbot – Malware of the Month, November 2019

| | Cloud and Data Security
The Zeus Virus, or Zbot, is a crafty and undetectable strain of malware that has been rather resilient and shown a strong ability to evolve since its first detection in 2007. For that reason, it's our Malware of the Month for November, 2019 ... Read More