Top White Papers and Webcasts

  • The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk.     The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks …

  • Anatomy of Magecart Attacks   Digital skimming is a known threat of the digital era. With the advent of online shopping requiring credit card info to be filled the digital scamming rates grew exponentially. Today our security experts will talk about one of the rising digital skimming methods - Magecart attacks, what they are, and how to detect and mitigate them. You will learn about:   How client-side code is being abused for digital skimming purposes Methods and tricks used by …