The Latest in IT Security

Posts Tagged ‘spreadsheets’

[Thanks to Takayoshi Nakayama for his research and contributions to this blog.] Targeted attacks have been a pretty popular topic of discussion in the security industry in recent years. Many may recall the incident involving Hydraq—from January 2010—and Shady RAT was something discussed more recently. Most targeted attacks involve emails with malware attachments as the […]

Read more ...

McAfee published an interesting report yesterday about what they called Operation Shady RAT, focusing on a series of what some may call “advance persistent threat” attacks. The attacks were dubbed in some quarters as “one of the largest series of cyber attacks ever.” While quite a bit of data was presented regarding the potential scale […]

Read more ...


TUESDAY, JULY 16, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments