Where is business done? Does it happen between work colleagues at an office within a business park high-rise? Between a shopper and a salesperson at a brick-and-mortar shop in a retail strip? In a manufacturing plant on the outskirts of […]
Where is business done? Does it happen between work colleagues at an office within a business park high-rise? Between a shopper and a salesperson at a brick-and-mortar shop in a retail strip? In a manufacturing plant on the outskirts of […]
Before the global pandemic, government agencies in the federal, state and local sectors were looking for ways to modernize their networks, specifically voice communications. Now with many working from home and outside of the physical government facilities across the US, […]
Summary The explosion of Internet of Things (IoT) devices has long served as a breeding ground for malware distribution. The inability for users to patch many IoT devices has only compounded this problem, as bad actors continue to evolve tactics […]
Despite the ubiquity of DNS, too many security teams today do not adequately prioritize it as a focus for monitoring and mitigation of risk. As recent security headlines demonstrate, one increasingly common cyberattack employed by malicious actors is DNS tunneling, […]
Over the past several years, Emotet has established itself as a pervasive and continually evolving threat, morphing from a prominent banking trojan to a modular spam and malware-as-a-service botnet with global distribution. After emerging in June 2014 targeting German and […]
Over the past year, CenturyLink Threat Research Labs has been tracking an IoT botnet called “TheMoon”. TheMoon is a modular botnet specifically targeting vulnerabilities in routers within broadband networks. Since its identification in early 2014 [1], the botnet has evolved […]