Posts by author
Panda Security
Panda Security verified by Citrix as Citrix Ready
Panda Adaptive Defense 360 is now a validated and recommended solution to help Citrix customers to strengthen their security stance. We are pleased to announce…
Island hopping: the tactic de rigueur among cyberattackers
Cybercriminals have used a tactic called island hopping to carry out a ransomware attack on 22 local governments in Texas.
CVs, the perfect tool to deliver malware
Security researchers have discovered a new phishing campaign that uses a CV that is sent as an attachment to get deliver a remote access Trojan.
Panda Security presents EDR and beyond at Gartner IT Symposium/Xpo 2019
Panda Security will be represented at the Gartner IT Symposium/Xpo 2019 with a team on hand to share their insights into the cyberthreat landscape.
LYCEUM and the dangers of spear phishing
A new APT called LYCEUM has been detected compromising gas and oil companies in the Middle East using spear phishing tactics to gain access.
Warshipping: the cyberthreat that arrives in the mail
Warshipping uses a disposable, low cost and low power computer to remotely perform close-proximity attacks, regardless of the cybercriminal’s location.
4 Family Media Agreement Printables For Your Electronics
Ensure your kids understand the responsibility of technology by creating a family media agreement for their computer, phone and video games.