Header Image

Understanding the MITRE ATT&CK Framework and Evaluations – Part 1

MITRE ATT&CK helps security teams across industries secure their organizations against known and emerging threats. Here’s how it works — and how it can help you. The world as we know it is changing around […]

BEC Attacks: Inside a $26 Billion Scam

A new Osterman Research study explores why Business Email Compromise (BEC) attacks are more financially devastating than ransomware — and how they can be stopped. Why would cybercriminals employ obfuscation tools, launch multi-stage cyberattacks, encrypt […]

Header image

Ransomware is Everywhere

Of all the products and services you use each day, how many have been impacted by ransomware? SonicWall takes an in-depth look. There’s no question that ransomware is on the rise. In the 2022 SonicWall […]

Cybersecurity image for blog post: Preparing for Cyberattacks During Ukraine Crisis

Shields Up: Preparing for Cyberattacks During Ukraine Crisis

SonicWall provides real-time protection against HermeticWiper malware and Conti ransomware expected during escalating conflict in Ukraine. With the recent escalation of events in Ukraine and the resulting sanctions imposed by various Western administrations, there is […]

Header image.

Capture Client 3.7: Rapid Threat Hunting with Deep Visibility and Storylines

As a threat hunter, your main mission is to understand the behavior of your endpoints and to capture abnormal behavior with rapid mitigation actions. You need the ability to, with a single click, search your […]

Facebook

Recent
Comments
Tags

This post is also available in: Portuguese (Brazil) French German Japanese Korean Spanish