What threats are you missing?
Are traditional security methods enough?
Stay up to date with the SecureValue Blog
Most Recent Articles
Security researchers have identified several vulnerabilities in how apps open and handle URLs, leading to 1-click code execution actions that don’t require user input. It’s easy to think that a simple action like opening an URL in an application doesn’t pose much of a security problem, but that’s not really the case. Apps opening up […]
The Swedish authorities have decided to halt an investigation into a data breach supposedly perpetrated by the Russian military intelligence, GRU, over the course of a few months in 2017 and 2018. From December 2017 until May 2018, the Swedish Sports Confederation was under attack from a then-unknown entity. Following the investigation, authorities in Sweden […]
The Biden administration this week has issued a statement blaming the Russian government for the SolarWinds supply chain attack, imposing costs on the rival nation for its actions. A lengthy press release from the White House issued April 15 points the finger at Russian intelligence for several actions against U.S. sovereignty and U.S. partners. Chief […]
At G DATA we always are providing our customers with the confidence that our solutions always meet high standards to operate safely throughout their lifecycle worldwide. Our cyber security products has always produced many highlights like Anti-Ransomwa…
Users of the employment-oriented online service are being targeted with an assortment of phishing emails and scams in an attempt to hijack their LinkedIn accounts or promote fake LinkedIn email leads. According to Bitdefender Antispam Lab telemetry, ramifications of the LinkedIn data leak incident seem to have already manifested through new spam campaigns targeting inboxes […]
The overview page of the “VM Backup” module has been revised.
The URL of the former Aeternum Web App has been redirected to the Control Panel where all archived emails can be accessed via the browser and the Progressi…
Collaboration platforms used by employees have become a prime target for attackers seeking to take advantage of telework and the security risks this new paradigm entails, according to new research. People — and employees especially — need to stay in touch with friends and coworkers while staying at home. The available collaboration platforms can fill […]