The most recent content from our members.
Hey folks, a few caveats here, I'm fairly new to LEM, and we have some old hosts. That being said, does anyone have any ideas how I could use LEM to track down the source of a W32.Bugbear infection or if it's possible to use the tool for something like that? Kind Regards, EP
In an earlier blog, we saw what a blended threat is and what all elements constitute it. To quickly recap, a blended threat is a composite security threat which involves various threat vectors coordinated to launch a high-degree security exploit that’s both difficult to detect and contain. How Does a Blended Threat Work?…
It’s no surprise that security attacks are getting more complex and sophisticated to deal with. Such advancement in the technology of cyber-crime makes it paramount that IT security teams start understanding new-age threats, and equip themselves with proper strategies to counter attacks. Blended threats are one of the many…
It looks like you're new here. Sign in or register to get started.