Posts tagged with "BlackBerry Spark Suites"



Jennlog Malicious Loader
Blog | Endpoint Protection · 08. November 2021
A malicious loader named Jennlog has recently been used by an Iranian threat actor called Agrius in a ransomware attack against a university in Israel. The malware was written in .NET assembly language, and designed to target Windows® machines.

FBI Attributes Ransomware Attack on Meatpacker JBS to REvil
05. July 2021
The attacks on the world’s largest meat supplier, JBS, from May 30, 2021, took place by theRansomware-as-a-Service (RaaS) group REvil (also known as Sodin/Sodinokibi), the FBI informed. Such attacks could endanger the global food supply chain, and show the vulnerable state of critical infrastructure worldwide.

A better approach to cybersecurity
21. June 2021
Which Comes First: EPP, EDR or XDR? Recently there have been a few industry reports that have shed light – perhaps a confusing light – on BlackBerry’s cybersecurity vision. Rest assured, we are not wavering in our beliefs or slowed in our production. In fact, we’ve doubled the size of our portfolio in the last few months alone. We’ve released a new generation (the seventh) of our Cylance® AI engine math model (although our five-year-old model prevented Darkside just fine).

Capitol Hill Technology Vendor the Latest Victim of Ransomware Crimewave
15. June 2021
On Tuesday June 8th, iConstituent, a technology vendor used by dozens of House offices on Capitol Hill, became the latest high-profile victim of a ransomware attack. This crippling cyberattack on the constituent-outreach company comes on the heels of successful ransomware campaigns against a major U.S. pipeline system, Colonial Pipeline, the world’s largest meat supplier JBS, and electronics giant Acer.

Mobile Threat Defense
06. May 2021
It's World Password Day today, an annual celebration of the longest-lived cybersecurity control in computing history. Since the dawn of bits and bytes, passwords have been the pivotal first line of defense for the security of systems and networks.

mobile security challenges
21. April 2021
Mobile devices make irresistible targets for threat actors because they’re both ubiquitous and vulnerable. In 2020, there were an estimated 3.5B smartphone users. This year, another 300 million are projected to join their ranks. For the first time, more than half of all devices connected to the Internet are mobile. Many of these devices will be used by remote workers to access their employers’ enterprise networks, cloud applications, and data. By 2024, mobile workers are projected to...

Life after McAfee
12. April 2021
McAfee’s announcement that it was exiting the enterprise security space to focus exclusively on the consumer market was not entirely unexpected. Many large businesses had become disenchanted with the firm’s ‘ security supermarket’ approach to cyber-risk management, and the resulting costs and complexities of having to manage and upgrade multiple incompatible toolkits. McAfee had also stumbled in its efforts to update its legacy AV technologies and meet customer demands for effective...

The Top Unified Endpoint Management (UEM) Solutions
17. February 2021
Discover the top ten best unified endpoint management solutions. Explore features such as user authentication, application controls, and reporting and analytics.

Mobile Threat Defense
17. December 2020
For more than 70 years, Pepperl+Fuchs has been a pioneer in the field of industrial sensor technology and explosion protection. With its portfolio, the company supports both conventional and industry-4.0-capable applications.

Mobile Threat Defense
14. December 2020
Establishing a comprehensive approach to endpoint security impacts your entire organization. A successful UES empowers you and your workforce to be secure without sacrificing productivity. Discover all the possibilities and benefits of securing your endpoints on a single, unified platform.

Show more