CDM Featured Whitepapers

Managed File Transfer: What it is, how it works, and why you need it


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


Hackers tried to cause a blast at a Saudi petrochemical plant

Hackers tried to cause a blast at a Saudi petrochemical plant A new cyber…

A.I. IoT Robot Critical Vulnerability Discovered, Proof of Concept Exploit

Some people are very afraid of an artificially intelligent future where vicious robots become…

MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers

MOSQUITO is new technique devised by a team of researchers at Israel’s Ben Gurion University,…

Drive-by as a service: BlackTDS

Overview Proofpoint researchers have been tracking a new Traffic Distribution System called BlackTDS implicated…

The 2018 Guide to Finding a Secure File Transfer Solution

It’s no secret—file transfers are an integral part of how each business runs. From…

Group-IB supported law enforcement in dismantling Ukrainian DDoS crime gang

Ukrainian Police supported by security firm Group-IB and other security firms dismantled a DDoS…

Cryptocurrency Mining Operations Now Targeting Servers

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns…


As a society, we cherish our right to privacy probably more than anything else….

The Risks of Crypto-currency Mining Infections

During 2017, the crypto-currency market grew nearly 20-fold, reportedly increasing from approximately $18 billion to more…

New Remote Access Trojan (RAT) Discovered

Leaked source code for Ammyy Admin turned into FlawedAmmyy RAT Overview Proofpoint researchers have…

Show Buttons
Hide Buttons