59 posts
Garmin: the latest wearable attacked by ransomware and a controversial ransom
To effectively counter new threats, companies like Garmin need protection against advanced threats and targeted attacks which is capable of detecting anomalous behavior.
Don’t let ransomware shut your business down!
Ransomware is constantly reinventing itself to persist over time and in effectiveness. Discover 5 tips to protect your business from this threat.
EMOTET reemerges after months in hiding
In this latest reappearance, Emotet has returned to one of its favorite attack vectors: a massive spam campaign with malicious links or attachments.
Microsoft seizes control of domains used in phishing attacks
This particular phishing operation was unique in that the attack did not redirect users to websites that spoofed the Office 365 login page.
Danger hiding in plain sight: the risks that your applications can pose
Find out more about the malicious use of legitimate applications in our ebook, Danger Hiding in Plain Sight: Controlling Weaponizable Applications.
“Panda has perfected it”: IT Pro reviews Adaptive Defense 360
IT Pro, one of the UK’s leading enterprise IT websites has published a review of Panda Adaptive Defense 360, in which it awards the solution five stars.
Getting to know the Threat Hunting process
Here we explain the Threat Hunting process in more detail, and present a real case in which this Panda Security protected company computers.