The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.
Going Bold: Cybersecurity is Not for the Faint of Heart
Ericom's new website features a new design, colors, and logo symbolize the strong protection offered by our cloud-based cybersecurity solutions
Read MoreNew Variant of Credential-Stealing Browser Malware
The new Zaraza bot successfully decrypts encrypted user credentials stored in browsers and exfiltrates them to Telegram servers for purchase by aspiring cybercriminals.
Read MoreWith AI, Even Amateurs Can Create Sophisticated Malware
Despite good faith attempts at building in guardrails, generative AI platforms have been successfully coaxed to create undetectable malware.
Read MoreNew Cyberthreats from Old Vulnerabilities
Newly identified vulnerabilities, especially those that impact widely used software solutions, are big news, as they should be. But over three-fourths of actively exploited vulnerabilities are old ones that organizations have overlooked.
Read MorePlaying for Keeps: Hackers Target Gaming and Gambling
Understand why attacks on gaming companies are on the rise and read about solutions that can help protect web-based games from attack.
Read MoreBetter Together: Ericom Joins Cradlepoint
A letter from Ericom’s CEO, celebrating the company’s acquisition by Cradlepoint and the opportunities it creates for our organizations and customers.
Read MoreEvilProxy Broadens AitM Cyberthreat with Phishing-as-a-Service Tool
Adversary-in-the-Middle attacks, which made the news a while ago as new way to bypass MFA, is now available as a service.
Read MoreHelping the Public Sector Drive Innovation and Security
SaaS apps, collaboration platforms, and virtual meeting solutions can increase efficiency, they also increase exposure to cybersecurity risks.
Read MoreRegulated Industries and Shadow IT Headaches
For organizations in highly regulated industries, like financial services, Shadow IT poses a double threat, with us exposing them to compliance risk as well as breaches and cybersecurity risk.
Read More