Companies are utilizing the public cloud as their primary route to market for creating and delivering innovative applications.
Companies are utilizing the public cloud as their primary route to market for creating and delivering innovative applications.
The cloud environment is elastic and moves fast. That elasticity applies to cyberattacks just as much, so it is critical for enterprises to have visibility into all the data that crosses its network. While moving workloads and applications to the cloud brings flexibility and agility, it also introduces multiple points of attack. Enterprises need to […]
ONLINEG, a spyware known to steal online gaming credentials, appears to be adding backdoors to its resume. We found a variant (specifically TSPY_ONLINEG.OMU) that aside from the usual data theft routine, also downloads a backdoor onto the infected system, making it vulnerable to more damage. TSPY_ONLINEG.OMU was recently found on certain South Korean websites, which […]
Latest Comments