391 posts
The Cybersecurity Imitation Game, or how much is your security worth
Alan Turing was born on 23 June 1912. His lasting legacy is the Turing Test, which can be seen as the start of the search for Artificial Intelligence.
How to mitigate the most important vulnerabilities in 2020
“Top vulnerabilities 2020” is a list of the most notable vulnerabilities discovered in 2020, affecting the Windows operating system.
BazarBackdoor: A new gateway to corporate systems
Cybersecurity researchers have discovered a new phishing campaign that delivers a stealthy backdoor called BazarBackdoor.
The five tools you need to manage your work environment
At Panda, we want to help companies to protect and manage their users and devices, wherever they are, with the necessary tools to deal with cyberthreats.
Panda Security launches its Threat Insights Report 2020
Panda Security has published its Threat Insights Report 2020, where it analyzes the leading cybersecurity trends and cyberthreat activity.
Protecting companies against BGP hijacking and DDoS attacks
Network problems caused by BGP hijacking and DDoS attacks are a serious problem for digital infrastructures and can have costly consequences for businesses.
Trojans instead of holidays in Germany
There is a phishing campaign under way in Germany. The emails supposedly come from the Federal Ministry of Health and contain malicious attachments.