Why do companies fail to stop breaches despite soaring IT security investment?
Let’s first take a look back at 2020! Adding to the list of difficulties that surfaced last year, 2020 was also grim for personal data protection, as it has marked…
Hackers exploit websites to give them excellent SEO before deploying malware
Climbing up Google’s ranks is key to this new technique. Read more from the Source
#ShareTheMicInCyber: Rob Duhart
Posted by Matt Levine, Director, Risk Management In an effort to showcase the breadth and depth of Black+ contributions to security and privacy fields, we’ve launched a series in support…
Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites
A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads. “The Gootkit malware family has been around more…

