In today’s digital world, data breaches and cyberattacks are increasingly common. While many organizations take this risk factor for granted, the consequences of a cyberattack can be profound and far-reaching. In the event of an attack, business... Read more
When it comes to protecting your business from cyber threats, you can never be too careful. In fact, cyber security threats pose a greater risk to businesses than ever before. According to the Institute of Critical Infrastructure Technology (ICI... Read more
Hybrid work environments, also known as blended or co-working models, are on the rise. They take many different forms but generally refer to workplaces that have some combination of desktop computers, laptop computers, or mobile devices. Because... Read more
The eScan Security Research Team discovered a banking Trojan named Aberebot during our Open-Source Threat Hunting. This Trojan is capable of stealing financial and personal information from infected devices. Advanced anti-reverse engineering tec... Read more
PowerShell was created with the intention of helping system administrators automate tasks and maintain configurations. However, it didn’t take long for attackers to learn that it could be used to carry out offensive activities covertly. Be... Read more