![]()
Cyber Hub -Secure Users& Access
The traditional security perimeter is disappearing, being replaced by border-less workplaces where data roams freely among cloud, network and endpoint applications. This new paradigm entails a widened attack surfaces, leaving organizations exposed to data breaches and cyber-attacks.
EDR vs MDR vs XDR
Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Extended Detection and Response (XDR) are three ...
閱讀更多內容 7 minute read
端點資安
Endpoint security refers to the methods organizations use to protect the devices that connect to their networks and ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
Top Email Security Threats
Email security threats are constantly evolving to evade enterprise defenses. In recent years, this evolution has been supercharged ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
Top 5 Mimecast Competitors & Alternatives
Mimecast is a well-known name in the email security field, offering enhanced protection for Microsoft 365 and Google Workspace. ...
閱讀更多內容 7 minute read
DMARC: What It Is and How It Works
Domain-based Message Authentication Reporting & Conformance (DMARC) is an email security protocol that authenticates domain-based email by validating ...
閱讀更多內容 7 minute read
What Is Email Archiving?
Email archiving is a compliance and security strategy that involves storing incoming and outgoing emails, attachments, and metadata ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
Email Security Pricing - Explore The Models
Email security pricing goes far beyond just licensing fees. Instead, pricing reflects a blend of deployment models, protection ...
閱讀更多內容 7 minute read
預防帳戶收購
An account takeover (ATO) is a form of cyberattack where malicious actors use stolen credentials, weaknesses in account ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
Email Data Loss Prevention (DLP)
Email Data Loss Prevention (DLP) refers to technologies and policies designed to stop sensitive information from being accessed ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
Email Phishing Protection
Much of cybersecurity focuses on technical protections, securing digital assets, and developing a robust attack surface that can ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
What Is Malware Protection?
Malware protection refers to the security software, tools, and practices that protect digital systems against malicious software. Malware ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
需要遵循的 10 項電子郵件安全最佳實務
Email security refers to protecting email accounts and systems from malicious cyberthreats. Email remains the most popular attack ...
閱讀更多內容 10 minute read
Yurei Ransomware: The Ghost of Ransomware
The Yurei ransomware group first appeared in late 2025. Since then, source code analysis by Check Point Research has ...
閱讀更多內容 5 minute read
What is Email Security as a Service (ESaaS)?
Email Security as a Service (ESaaS) is a cloud-delivered approach to managing and enhancing enterprise email protection. Traditional ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
Phishing Links - How to Identify and Protect
Links, or URLs, are central to sharing online resources – they allow colleagues to access important documents, potential clients ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
6 Types of Email Security Software
Despite a significant rise in web-based attacks, email is still the number 1 attack vector. 68% of all attacks can ...
閱讀更多內容 10 minute read
Business Email Compromise (BEC) vs. Phishing
Understanding the various forms of social engineering attacks and the specific threats they pose is crucial for maintaining ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
AI Social Engineering
AI social engineering, or AI-based social engineering attacks, is the use of manipulative strategies to extract personal details ...
閱讀更多內容 5 minute read
What Is Enterprise Mobile Security?
Enterprise mobile security is the policies, technologies, and practices that protect mobile devices and the business resources they ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
AsyncRAT Malware Explained: Remote Access Trojan Used in Cyberattacks
AsyncRAT is a family of malware commonly used in cyberattacks as a Remote Access Trojan (RAT), providing remote ...
閱讀更多內容 5 minute read
Deepfake Cyber Security Threats
A deepfake is any type of computer-generated digital media that purports to be real: it’s also, in 2025, ...
閱讀更多內容 5 minute read
Raspberry Robin Malware: A Worm Weaponizing USBs
Raspberry Robin has evolved from a USB-delivered worm to a sophisticated and elusive multipurpose malware that spreads via ...
閱讀更多內容 5 minute read
Lumma Malware: Unmasking the Stealthy Infostealer
The 2025 State of Cyber Security Report shows infostealer attacks increased by 58% in the past year. This rise in ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
Qilin Ransomware (Agenda): A Deep Dive
Qlin ransomware, also known as Agenda ransomware, is a popular RaaS (Ransomware-as-a-Service) operation that sells its technology to ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
AI Phishing Attacks - An Evolving Threat
AI phishing is a type of cyberattack that uses AI to create personalized phishing messages, making them difficult ...
閱讀更多內容 5 minute read
Malware-as-a-Service (MaaS): Cybercrime’s Subscription Model
Malware-as-a-Service (MaaS) makes malware delivery available on demand to anyone with the funds to pay for it. Analogous ...
閱讀更多內容 5 minute read
Medusa Ransomware Group: A Rising Threat in 2025
The Medusa ransomware group is a rising threat actor in the 2025 ransomware ecosystem. Businesses that fall victim to ...
閱讀更多內容 5 minute read
SafePay Ransomware: An Emerging Threat in 2025
SafePay is a new and sophisticated ransomware group in 2025. While it was only identified in September 2024, SafePay ransomware ...
閱讀更多內容 5 minute read
What Is the Cl0p Ransomware Strain?
Cl0p ransomware, a type of Cryptomix malware, is the final payload of a complex malware infection. When ...
閱讀更多內容 5 minute read
Infostealers - How to Prevent and Mitigate?
Infostealers are a type of malware that infiltrates computer systems to steal sensitive information, such as login credentials ...
閱讀更多內容 5 minute read
What is the Amadey Botnet?
Primarily acting on Windows devices and systems, Amadey is a modular botnet, so it can be instructed to ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
FunkSec Ransomware - AI Powered Group
Discovered near the end of 2024, FunkSec ransomware is a bit different from traditional ransomware attacks. Rather than merely ...
閱讀更多內容 5 minute read
Enterprise Browsers Explained: Benefits, Features, and Use Cases
Unlike all other enterprise apps, browsers have remained quite recognizable throughout the last few decades’ worth of technical ...
閱讀更多內容 5 minute read
What is Advanced Threat Detection?
Threat detection is the process of finding gaps in an enterprise’s attack surface. Advanced threat detection provides ...
閱讀更多內容 5 minute read
What Is An Email Security Platform?
An email security platform is a piece of cybersecurity infrastructure that will monitor your incoming email communications and ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Different Types of Endpoint Security Solutions
Endpoint security solutions are cybersecurity measures designed to protect endpoints, such as desktops, laptops, mobile devices, and servers, ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
Enterprise Data Loss Prevention (DLP)
Enterprise Data Loss Prevention (DLP) refers to a set of tools, policies, and strategies designed to prevent unauthorized ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
What Is Rilide Malware?
Rilide malware is a strain of malware that was discovered in April of 2023. Rilide primarily targets Chromium-based browsers, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What Is Discord Malware?
Discord malware is a general term that describes any malware packages that are shared via Discord. The types ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
ElizaRAT: Prevention, Mitigation & Recovery
ElizaRAT is a remote access trojan controlled by APT36, AKA Transparent Tribe. ElizaRAT has been used to target ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Meow Ransomware Group: Definition, Prevention & Mitigation
Meow Ransomware group is a highly active ransomware and data exfiltration gang that utilizes its own strain of ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What Is FakeUpdates Malware?
FakeUpdates malware is a type of malware that creates false prompts for users to download a new update ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Graymail?
Graymail refers to email that falls somewhere between wanted and unwanted mail. It’s not outright spam, but ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What Is Cloud Vulnerability Management (CVM)?
Cloud vulnerability management (CVM) refers to the process of identifying, classifying, and mitigating security weaknesses in cloud environments. ...
閱讀更多內容 5 minute read
Malware Protection - How Does It Work?
Malware protection is a suite of tools that collectively work to identify, prevent, and neutralize malicious code from ...
閱讀更多內容 7 minute read
What Is Cloud Endpoint Security?
Cloud endpoint security is the practice of securing and monitoring devices connected to cloud services to prevent, detect, ...
閱讀更多內容 5 minute read
Compromised Credentials: Everything You Need to Know
Credential compromise is when access keys for a legitimate account are stolen and used by attackers. It represents ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What Is Content Filtering and The Different types
The open web is a resource that drives constant innovation and efficiency: it’s also, at times, a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Explore The Key Components of SASE
Secure Access Service Edge (SASE) is a cloud-native solution that integrates several networking and security functions into a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What Is Enterprise Endpoint Protection?
Enterprise endpoint protection refers to systems and procedures that enhance the security of network-connected endpoint devices such as ...
閱讀更多內容 5 minute read
Anti-Malware Solution- How Does It Work?
Anti malware is a type of security software program that aims to protect IT and business-critical systems from ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
How to Prevent Malware: 8 Effective Tips
Preventing malware infections is a continual challenge for cybersecurity teams. Organizations must know the strategies to defend against ...
閱讀更多內容 5 minute read
What Is Credential Phishing?
Your organization’s security demands that its data remains confidential and accessible. Login credentials are the foundation for ...
閱讀更多內容 5 minute read
What is RansomHub Ransomware?
Check Point’s latest Threat Index has shown cyber threat group RansomHub to be one of today’s ...
閱讀更多內容 5 minute read
Inc. Ransom Group – Detection and Prevention
Inc. Ransom is a group of cybercriminals that focuses on launching targeted attacks on large-scale organizations and corporate ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Androxgh0st Malware: Everything You Need to Know
Androxgh0st is a Python-based scripted malware that targets applications that use Laravel (like AWS, Twilio, Office 365, and ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is CloudEyE Malware?
CloudEyE, also known as GuLoader, is a downloader malware that gains entry into a system and then downloads ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Play Ransomware Group – Detection and Protection
Play ransomware, also known as Play or Playcrypt, is a group of cybercriminals that have successfully infiltrated over 300 ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Enterprise Email Security?
Enterprise email security is vitally important to ensure reliable internal collaboration among coworkers and private external communications to ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Threat Exposure Management (TEM)?
Threat exposure management (TEM) is the practice of managing potential threats to corporate cybersecurity. It involves cyber risk ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
SASE vs SSPM
Modern organizations are increasingly reliant on Software as a Service (SaaS) applications to support their distributed workforces. However, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
ZuoRAT Malware
ZuoRAT is a remote access trojan (RAT) that has been active since at least 2020 but was first detected ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Spam Filtering and How Does It Work?
Spam filtering is a feature in email and email security programs designed to help protect an organization against ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
CACTUS勒索軟體
CACTUS ransomware is a malware strain that was first discovered in the wild in March 2023. Its name is ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Email Security Protocols Every Business Should Have
While businesses may use various collaboration tools, email still reigns supreme as the most used medium for corporate ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Email Authentication?
Email authentication proves that an email originated from the alleged sender. Email authentication protocols are designed to protect ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是基於應用程式開發介面的電子郵件安全?
API-based email security leverages email programs’ APIs to protect against various threats. Instead of deploying email security solutions ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
8Base 勒索軟體集團
8Base is a ransomware group that first emerged in 2022 but ramped up its operations and refined its methods ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
SSPM vs CASB
Companies have a few different options for improving the security of their cloud environments, and, especially, the SaaS ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
軟體即服務 安全態勢管理 (SSPM)
A SaaS Security Posture Management (SSPM) solution is a cybersecurity solution designed to manage the security posture of ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
Akira Ransomware
Akira is a new ransomware variant that was first identified in the wild in Q1 2023. This malware variant ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Locker Ransomware
Traditionally, ransomware extorts money from its victims by encrypting their files. Without access to the decryption key used ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
網路釣魚偵測技術
Phishing attacks are a common threat and are used to launch a variety of cyberattacks. A successful phishing ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是雙重勒索軟體?
Originally, ransomware used the threat of data loss to inspire its victims to pay a ransom demand. It ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是三重勒索軟體?
Originally, ransomware used a single extortion vector, encrypting data and demanding a ransom for the decryption key. Double ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是加密勒索軟體?
Crypto ransomware — also known as crypto-malware is malware that encrypts files on a device and demands a ransom ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Socgholish Malware
Socgholish is a malware variant first discovered in the wild in 2018. The malware acts as a downloader and ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Unified Endpoint Security (UES)
Unified endpoint security (UES) is an evolving approach to endpoint security focused on converging multiple endpoint security capabilities ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Why You Must Have AI For Email Security
While the concepts of artificial intelligence (AI) and machine learning (ML) have been around for decades, AI has ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Quishing (QR Phishing)?
Quishing is essentially a form phishing attack that cleverly uses QR codes to trick users into visiting malicious ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是託管 SOC?
The Security Operations Center (SOC) is the heart of an organization’s defenses against cyber threats. The SOC ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 SOC 自動化?
The Security Operations Center (SOC) is the heart of an organization’s security program. SOC responsibilities include performing ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Interplanetary File System (IPFS) Phishing Attack
The Interplanetary File System (IPFS) is a decentralized file storage and access protocol designed to complement blockchain technology. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
7 XDR Best Practices
Organizations face a cyber threat landscape that is rapidly growing and becoming more sophisticated. Cyber threat actors have ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
8 種網路釣魚技術
Phishing is one of the most common cyberattacks in existence. Many cybercrime groups use phishing as an initial ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What Is Clone Phishing?
Clone phishing is a type of phishing attack in which the attacker duplicates an email that someone has ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Qakbot 惡意軟體
Qakbot — also known as Qbot and Pinkslipbot— was originally a banking trojan that was first discovered in the ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
網路釣魚與網路釣魚
Phishing has long been one of the most common cyberattacks that organizations face. These attacks are designed to ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
How to Spot a Phishing Email
Phishing has long been one of the most common cyber threats that organizations face. Phishing attacks can be ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是營運安全 (OPSEC)?
Operational Security (OPSEC) is a term that originated with the U.S. military during the Vietnam War. It ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
社會工程 vs 網路釣魚
The popular conception of cyberattacks and hacking is of someone exploiting a vulnerability in software to gain access ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
欺騙與網路釣魚
Social engineering attacks are designed to target people rather than attempting to exploit vulnerabilities in software or an ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
魚叉式網路釣魚 vs 網路釣魚
Phishing attacks are some of the most common cyberattacks in existence. One of the reasons for their ubiquity ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
惡意軟體與病毒
The terms malware and virus are often used loosely and interchangeably to mean malicious or unwanted software installed ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 NJRat 惡意軟體?
NJRat — also known as Bladabindi — is a remote access trojan (RAT) that was first discovered in the wild ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Hiddad Android 惡意軟體
Hiddad is an Android malware variant focused on ad fraud. The mobile malware distributes unwanted advertisements to users ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
SpinOk 惡意軟體
SpinOk is a mobile malware variant that targets Android devices. It is spyware that collects information from infected ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
NanoCore RAT 惡意軟體
NanoCore is a Windows Remote Access Trojan (RAT) that has been active in the wild since 2013. The RAT ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
AhMyth 惡意軟體
AhMyth is an Android malware variant that operates as a remote access trojan (RAT). It commonly masquerades as ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
GuLoader 惡意軟體
GuLoader is a type of trojan malware that was first discovered in December 2019. It commonly acts as the ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
惡意軟體分析
惡意軟體分析是一個透過分析可疑或惡意執行檔,以更好地了解其目的的計畫流程⋯⋯
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
惡意軟體檢測:方法和技術
惡意軟體是為了要感染系統並達成各種不良目的的所建構出來的惡意軟體。惡意軟體可以竊取或⋯⋯
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是鍵盤側錄程式?
鍵盤側錄程式是能夠記錄使用者在電腦上按鍵鍵擊資料的程式。這些程式能⋯⋯
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是裝置狀態檢查 (DPC)?
Endpoints are one of the biggest security threats to an organization, especially with the rise of remote work. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
裝置即服務 (DaaS)
The growth of remote and hybrid work has resulted in a surge in mobile device usage for business. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是脆弱性評估?
A vulnerability assessment is an effort to identify vulnerabilities in a computer or network. This is often performed ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What Is a Computer Virus?
A computer virus is a type of malware that can replicate itself, spreading to infect new systems. However, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是曝光管理?
As companies update and expand their IT infrastructure, they introduce new vulnerabilities and attack vectors. At the same ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是電腦蠕蟲?
A computer worm is malware that is capable of spreading by itself with no human interaction. Wannacry is ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
端點資安作為服務
Endpoint security is the practice of protecting endpoints — computers, mobile devices, servers, etc. — against cyber threats. Historically, this ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是電子郵件安全政策?
An email security policy defines rules about the use of email within an organization. By laying out the ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是修補程式管理?
Software often contains errors or bugs that can impact its functionality or security. Some of these bugs are ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是人肉搜尋?
Doxing — also spelled doxxing — is a term derived from the phrase “dropping dox (documents)”. Doxing is when a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Wiper 惡意軟體?
A wiper is malware that deletes or destroys an organization’s access to files and data. This type ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是安全營運 (SecOps)?
SecOps is a collaboration between an organization’s security (Sec) and operations (Ops) teams. The goal of SecOps ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
使用者和實體行為分析 (UEBA)
User and Entity Behavior Analytics (UEBA) solutions are designed to identify cybersecurity threats based on abnormal behavior. Once ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 PGP 加密?
Pretty Good Privacy (PGP) is a tool for email encryption. It was first developed in 1991, and, in the ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
BYOD 安全性
Bring Your Own Device (BYOD) policies allow employees to use personal devices — including laptops, mobile devices, USB drives, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
小丑惡意軟體
Joker is spyware that collects SMS messages, contact lists, and information about infected devices. Additionally, Joker has the ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Anubis 惡意軟體
Anubis began as a banking trojan targeting Android devices. However, it has gained additional functionality over time, including ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Vidar 惡意軟體?
Vidar is an infostealer malware operating as malware-as-a-service that was first discovered in the wild in late 2018. The ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是廣告軟體?
Adware is a type of malware or unwanted software designed to deliver targeted advertisements on infected computers. Adware ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
Hydra 惡意軟體
Hydra, a banking trojan that targets Android devices, was first discovered in 2019. By tricking users into enabling dangerous ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是安全電子郵件伺服器?
An email server is responsible for sending and receiving emails for an organization. This is a crucial role ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
IcedID 惡意軟體
IcedID is a banking trojan that was first discovered in the wild in September 2017. In October 2022, it was ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
蛇鑰匙記錄器惡意軟體
Snake Keylogger is a relatively new credential stealer and keylogger that was first discovered in the wild in ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
勒索軟體防護最佳實踐
Emerging as one of the leading threats to corporate cybersecurity in 2022, ransomware attacks are growing more frequent, and ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Enterprise 端點資安
Endpoint security is a critical part of any organization’s security strategy. However, enterprises face advanced security threats ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是加密惡意軟體?
In some blockchain platforms, such as Bitcoin or Monero, miners can earn money by performing computationally-expensive operations. Cryptojackers ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
什麼是網路釣魚防護?
Phishing attacks, a major threat to corporate and personal cybersecurity, can deliver malware and steal sensitive data or ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是無檔案惡意軟體?
Historically, most malware was delivered as files, which would be downloaded to a computer, written to its memory, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
安全運作中心 (SOC) 架構
The cyber threat landscape is rapidly evolving, and companies are facing growing numbers of highly sophisticated threats. Ransomware, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
XDR vs. 安全性資訊與事件管理
When designing its security infrastructure, an organization has many potential solutions to choose from. With the sea of ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
11 種社會工程攻擊
Using deception and manipulation, social engineering attacks induce the target into doing something that an attacker wants. The ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
EDR vs. 安全性資訊與事件管理
Endpoint detection and response (EDR) and security information and event management (SIEM) solutions are both designed to improve ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是電子郵件掃描?
Email is one of the most widely used forms of corporate communication, but it is also a common ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
安全作業中心 (SOC) 最佳實務
The Security Operations Center (SOC), responsible for protecting the organization against cyber threats, includes not only security personnel ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
端點資安的類型
Corporate networks contain a diverse set of endpoints that are common targets of cyberattacks. Endpoint security is the ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是端點資安管理?
The growth of remote work and the increasing use of off premise endpoint and mobile devices for business ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Tofsee 惡意軟體
Tofsee is a modular trojan malware. Once installed on an infected computer, it can be used to send ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Remcos 惡意軟體
Remcos is a remote access trojan (RAT) and one of the top ten malware variants of 2021. After infecting ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Glupteba 惡意軟體
Glupteba is a trojan horse malware that is one of the top ten malware variants of 2021. After infecting ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Phorpiex 惡意軟體
Phorpiex is a botnet malware and one of the leading malware threats of 2021. The Phorpiex botnet is well-established ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Cloud DLP(資料外洩防護)?
Data loss prevention (DLP) solutions are essential to protect the sensitive information of an organization and its customers. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Ramnit 惡意軟體
Ramnit is a banking trojan that was first discovered in 2010. It is one of the top 5 banking trojans ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Lokibot 惡意軟體
Lokibot is infostealing malware that was first discovered in 2016. Between 2020 and 2021, the malware experienced a significant drop but ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
XMRig 惡意軟體
XMRig is open-source software designed for mining cryptocurrencies like Monero or Bitcoin. However, it is also commonly abused ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
不同類型的電子郵件安全服務
Email is one of the most common and established platforms for corporate communications. Companies use emails to communicate ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
康迪勒索軟體集團
Conti is a high-profile ransomware group responsible for multiple high-impact attacks. The group is believed to be based ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 FormBook 惡意軟體?
FormBook is an infostealer malware that was first discovered in 2016. It steals various types of data from infected ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Dridex 惡意軟體?
Dridex is a Windows-focused banking trojan that has since expanded its capabilities to include infostealing and botnet capabilities. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
代理特斯拉惡意軟體
Agent Tesla is an example of an advanced remote access trojan (RAT) that specializes in the theft and ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
八大端點資安最佳實務
Corporate endpoints are a common target for cyberattacks. Threat actors attempt to gain access to corporate devices to ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
如何防止 iPhone 日曆垃圾郵件
Phishing is seen as a threat that occurs via email, text messages, social media, and other messaging platforms. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 SIM 卡交換?
With the growth of multi-factor authentication (MFA), smartphones have become a critical part of an organization’s cybersecurity ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
MDR 與安全資訊與事件管理
Many organizations’ security teams are overwhelmed by expanding responsibilities and a rapidly evolving threat landscape. Various solutions to ...
閱讀更多內容 5 minute read
Emotet 惡意軟體
Emotet is a sophisticated, self propagating Trojan . While Emotet began as a banking trojan, its modular design has ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是間諜軟件?
Spyware is a type of malware designed to collect information about the users of an infected computer. Spyware ...
閱讀更多內容 5 minute read
公司應該如何處理leasing軟體?
In 2021, high-profile ransomware attacks, such as the Colonial Pipeline and Kaseya hacks, caused significant disruptions to supply chains ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是電子郵件加密?
Encryption functions are algorithms designed to render data unreadable to anyone that does not have the decryption key. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
電子郵件安全功能
Malicious emails are behind 90% of cyberattacks and deliver 75% of ransomware. These phishing emails are designed to trick or ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 BYOD(自備裝置)?
Bring Your Own Device (BYOD) programs allow employees to work from their own personal devices rather than a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
EDR 與防毒軟體
Endpoint security is a vital component of an enterprise cybersecurity strategy. Antivirus (AV) and endpoint detection and response (...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
什麼是進階端點防護 (AEP)?
With the shift to remote work and adoption of Internet of Things (IoT) and mobile devices, the endpoint ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是網址網路釣魚?
A link is not always what it seems. Hackers have gone to great lengths to create convincing websites ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
MITRE Engenuity ATT&CK 評估
The MITRE Corporation is a US Government federally funded research and development center (FFRDC), and the MITRE Engenuity ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是捕鯨攻擊?
A whaling attack is a form of spear phishing attack, where the cyber threat actor researches and tailors ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
社會工程攻擊
Social engineering is a security threat that targets humans rather than computers or software. Social engineers use a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
人為操作的勒索軟體
Ransomware has emerged as a dominant cyber threat and one of the most expensive types of cyberattacks that ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是雲端電郵安全?
According to Verizon’s 2021 Data Breach Investigations Report (DBIR), phishing is a leading cause of data breaches, accounting ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是安全電子郵件閘道器 (SEG)?
Secure Email Gateways (SEGs) are an email security solution that sits inline on emails’ path from the public ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
2022 年行動安全趨勢
The pandemic had a dramatic impact on business as usual for many organizations, causing many to shift to ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是統一端點管理 (UEM)?
The COVID-19 pandemic drove a massive shift to remote work. After this forced experiment, many organizations are looking ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是刺激?
Smishing is a form of phishing attack that targets mobile devices. Instead of sending phishing content over email, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是電子郵件偽造?
Simply put, phishing emails are designed to trick the recipient into believing that they are legitimate. A common ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼有助於防止魚叉式網路釣魚?
Spear phishing is a form of phishing attack that is targeted at an individual or a small group. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是帳戶接管 (ATO)?
In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
如何封鎖網路釣魚電子郵件?
Phishing emails are one of the most common cyber threats that an organization may face. Phishing attacks can ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
5 大電子郵件安全威脅
Email security threats aim to leverage the implicit trust between an email’s recipient and its sender. Today’...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
電解決反應對抗原因素
Endpoint detection and response (EDR) and managed detection and response (MDR) are both solutions designed to help improve ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是遠端存取木馬(RAT)?
Remote access trojans (RATs) are malware designed to allow an attacker to remotely control an infected computer. Once ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是維希攻擊?
Vishing – a portmanteau of voice and phishing – attacks are performed over the phone, and are considered a type ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
勒索軟體檢測技術
The ransomware threat continues to evolve, and high-profile and extremely damaging ransomware infections are becoming increasingly common. Minimizing ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
不同類型的勒索軟體
Ransomware is a top-of-mind security concern for many organizations. However, not all ransomware attacks are the same. A ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是網路釣魚電子郵件?
Phishing attacks are some of the most common cyberattacks and one of the main ways in which cybercriminals ...
閱讀更多內容 5 minute read
Android 惡意軟體
Mobile device malware is a significant threat to corporate and personal privacy and security. As mobile devices are ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
勒索軟體恢復:如何從勒索軟體中恢復
Ransomware has been around for decades, but ransomware attacks have surged in recent years after the WannaCry ransomware ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
NOC vs SOC - What’s the Difference?
The goal of a Network Operations Center (NOC) and a Security Operations Center (SOC) is to ensure that ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
何謂行動應用程式信譽服務 (MARS)?
Mobile applications are increasingly used for business purposes as companies adopt bring your own device (BYOD) and hybrid ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是加密劫持?
Cybercrime is a business, and cybercriminals are constantly looking for ways to monetize their attacks. Along with ransomware, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是高階威脅防護 (ATP)?
Cyberattacks are growing more common and sophisticated, as demonstrated by the recent surge in phishing and ransomware attacks. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是供應鏈攻擊?
Supply chain attacks are designed to exploit trust relationships between an organization and external parties. These relationships could ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
2022 年行動裝置安全最佳實務
As employees are increasingly using mobile devices for business purposes, protecting these devices against attack requires organizations to ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
何謂行動應用程式安全?
The COVID-19 pandemic and the rise of bring your own device (BYOD) policies have made mobile devices a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
SOAR 安全性-什麼是安全協調、自動化和響應?
Security Orchestration, Automation, and Response (SOAR) tools are designed to integrate multiple components, often from different vendors. They ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是遠端瀏覽器隔離(RBI)?
Remote browser isolation (RBI), also known as web isolation or browser isolation, is a web security solution designed ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
三大 Office 365 安全疑慮
Microsoft’s Office 365 is one of the most commonly used platforms of cloud-based applications. Globally, Office 365 is used ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
MDR 對 XDR
Many organizations’ security teams are struggling to keep up with their ever-expanding workloads. The combination of a growing ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是安全分析?
Data is essential to effective incident detection and response; however, many security operations centers (SOCs) are drowning in ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
MDR vs MSSP
For many organizations, maintaining a full-fledged in-house security operations center (SOC) is not a viable option. The expanding ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是行動版 MITRE ATT&CK Matrix(矩陣)?
The MITRE ATT&CK framework breaks down the lifecycle of a cyberattack into a set of objectives ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Web 安全?
On a daily basis, web browsing has the potential of exposing employees to a number of threats, including ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是憑證填充?
In a credential stuffing attack, cybercriminals take advantage of weak and reused passwords. Automated bots will take a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Web 過濾?
Web filtering software monitors and manages the locations where users are browsing on the Internet, enabling an organization ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是零日漏洞?
Zero day exploits target vulnerabilities that a software manufacturer has not yet patched. By taking advantage of largely ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是零日惡意軟體?
Zero day malware is malware that exploits unknown and unprotected vulnerabilities. This novel malware is difficult to detect ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是虛擬桌面基礎架構 (VDI)?
Desktop virtualization eliminates the need for employees to have physical access to corporate devices – it allows remote workers ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是端點加密?
Endpoint encryption uses encryption algorithms to protect the files stored on an endpoint. This is an essential part ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
DarkSide 勒索軟體組織解說
DarkSide is a relatively new ransomware group that has been responsible for high-profile attacks such as the Colonial ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
如何預防零日攻擊
Zero-day attacks are unknown threats that easily circumvent signature-based security solutions and therefore pose an exceptionally dangerous risk ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Business Email Compromise (BEC) - The different types of attacks
Business email compromise (BEC) is a specific type of phishing attack, a spear phishing attack to be precise – ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 MITRE ATT&CK Framework?
The MITRE ATT&CK framework, a tool created by the MITRE Corporation, breaks down the cyberattack lifecycle ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
DearCry 勒索軟體
DearCry, a ransomware variant, is designed to take advantage of four recently disclosed vulnerabilities in Microsoft Exchange. Once ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
EDR vs EPP:為什麼要選擇?
Endpoint Detection and Response (EDR) and Endpoint Protection Platforms (EPP) are both powerful components of an endpoint security ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
何謂下一代防毒軟體 (NGAV)?
Next-generation antivirus (NGAV) solutions are designed to update the legacy antivirus to address the modern cybersecurity threat landscape. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
安全操作中心 (SOC) 角色和職責
A Security Operations Center (SOC) is responsible for enterprise cybersecurity. This includes everything from threat prevention to security ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Office 365 安全最佳實踐
Even before the COVID-19 pandemic, organizations were increasingly adopting Office 365 and similar Software as a Service (SaaS) solutions ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是魚叉式網路釣魚?
Spear phishing is a highly targeted, personalized form of phishing where the attacker tailors messaging for a specific ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
什麼是端點保護平台 (EPP)?
Endpoint security is now more important than ever as ransomware attacks are targeting the endpoint, encrypting its files ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是威脅檢測和回應(TDR)?
Prevention is naturally the first pillar of cybersecurity – you can prevent over 98% of threats targeting your organization. But ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
5 Email Security Best Practices in 2023
Email is one of the most widely used media for business communications, yet this also makes it a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Office 365 安全性?
Microsoft Office 365 is one of the most widely-used Software as a Service (SaaS) platforms in the world, currently ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
6 大行動安全威脅以及如何防止
Mobile devices have become an increasingly vital component of many organizations’ IT infrastructure. The surge of remote work ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是移動安全?
Mobile security, which refers to the protection of mobile devices against cybersecurity threats, is a top-of-mind concern for ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
勒索軟體即服務 (RaaS)
Ransomware is one of the biggest threats to enterprise cybersecurity, and it continues to grow. In Q3 2020 alone, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
SOC vs SIEM - The Role of SIEM Solutions in SOC
SIEM and SOC are two of the biggest and most important acronyms in cybersecurity. Understanding the SOC vs ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
SOC 即服務
A Security Operations Center (SOC) is the team within an organization responsible for detecting, preventing, investigating, and responding ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
EDR VS XDR
Many cyberattacks begin at the endpoint. Phishing emails and similar attack vectors create an initial foothold on a ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
軟體 勒索允許黑客做什麼,一旦感染
Ransomware is a type of malware that became popular with the WannaCry attack in 2017. This particular type of ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
勒索軟體和惡意軟體之間的區別
Malware is a general term that covers a wide variety of different types of malicious software (which is ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
最常見的 5 種惡意軟體
Malware is malicious software designed to infect a user’s computer and achieve a variety of goals, including ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
端點偵測與回應 (EDR) 的優點
As organizations become more distributed and telework becomes more common, the endpoint has become a vital component of ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Data Loss Prevention (DLP) Solutions
For the modern business, data is often its most valuable possession. Whether it’s client lists, insights into ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Ransomware Removal - How To Remove Ransomware?
Ransomware is a type of malware designed to encrypt the files on a computer and demand a ransom ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
迷宮勒索軟體 – 雙重勒索攻擊
Ransomware is a growing threat to enterprise network security. In the third quarter of 2020, Check Point Research reported ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是行動惡意軟體?
With the transition to widespread remote work in the wake of COVID-19, mobile security has become more important ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是 Next Generation 端點資安?
There are all kinds of potential threats posed by a remote workforce, including the use of personal devices ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是內容解除與重建 (CDR)?
Content disarm and reconstruction (CDR), also known as Threat Extraction, proactively protects against known and unknown threats contained ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
有史以來最常見的 5 種網路釣魚詐騙
Phishing attacks are a popular attack vector for cybercriminals because they are simple and effective. A well-crafted phishing ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
選擇下一個網路釣魚防護解決方案時的 4 個關鍵考慮因素
One of the most common types of cyberattacks, phishing attacks are getting more sophisticated by the day. These ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
如何提高 SOC 的有效性
The cybersecurity threat landscape is rapidly evolving, and organizations’ attack surfaces are expanding due to widespread adoption of ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
XDR Security - What is Extended Detection and Response?
The cybersecurity threat landscape is rapidly evolving and expanding. In response, many organizations are working to evolve their ...
閱讀更多內容 7 minute read
什麼是管理式偵測與回應(MDR)?
The cybersecurity threat landscape is evolving, and organizations need advanced security solutions to keep up. Endpoint detection and ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
5大網路釣魚防護原則
Phishing emails are one of the most common methods that cybercriminals use to gain access to an organization’...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
如何防止網路釣魚攻擊
Some of the simplest and most effective techniques used by cybercriminals to achieve their goals are what are ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
安全操作中心 (SOC) 的重要性
The cyber threat landscape is evolving rapidly, and protecting against potential cyberattacks requires rapid monitoring and response. The ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
為什麼電子郵件安全性很重要
With over 90% of attacks on organizations starting from a malicious email, relying on your built-in security might leave ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
何謂行動裝置安全?
Mobile Device Security is a combination of strategies and tools that secure mobile devices against security threats. Although ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
給員工的電子郵件安全意識
With cyber attacks evolving every day, email attacks remain the number one vector by which malware is delivered ...
閱讀更多內容 5 minute read
如何保護您的電子郵件
Gone are the days of mass phishing emails telling you have an inheritance waiting for you if you ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
勒索軟體的演變
When a cyber-criminal wants to make a quick bundle of cash, they use Ransomware to infect a computer ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Do's and Don'ts for Ransomware
Ransomware is one of the most popular and most significant threats in the world of cybersecurity. Worldwide, there ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
行動勒索軟體
Hackers and cybercriminals are constantly evolving – trying new tactics, ditching the ones that no longer work, and emphasizing ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是移動威脅防禦(MTD)?
Mobile threat defense (MTD) is sophisticated, dynamic protection against cyber threats targeted against mobile devices. With MTD, protection ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
什麼是電子郵件安全?
Email security refers to the practice of protecting email against potential cybersecurity threats. Phishing, account takeover, and other ...
閱讀更多內容 7 minute read
Wannacry 勒索軟體
Allegedly developed by the North Korean Lazarus Group, WannaCry combined exploit code stolen from the US government with ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
What is Sandboxing?
Sandboxing is a cybersecurity practice where you run code, observe and analyze and code in a safe, isolated ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
Ryuk Ransomware: Definition and Protection
The Ryuk ransomware variant was first discovered “in the wild” in August 2018. Since then, it has grown in ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
最近的勒索軟體攻擊
One of the most famous malware variants in existence today, ransomware – which enables a cybercriminal to deny a ...
閱讀更多內容 閱讀時間 8 分鐘長的閱讀小品
如何防止勒索軟體
Ransomware has proven to be one of the most effective and profitable attacks for cybercriminals. A large part ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是端點檢測和響應?
Endpoint Detection and Response (EDR) is an integrated, layered approach to endpoint protection that combines real-time continuous monitoring ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是網路釣魚?網路釣魚攻擊的類型
Phishing is a type of cybersecurity attack during which malicious actors send messages pretending to be a trusted ...
閱讀更多內容 9 minute read
什麼是零時差攻擊?
There are many types of security vulnerabilities and opportunities for cyberattacks. Businesses are responsible for keeping their organizations ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
What is MDM (Mobile Device Management)
Mobile Device Management (MDM) is the process of managing mobile devices, largely in terms of usage and security. ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
什麼是 SOC(安全操作中心)?
The function of the security operations center (SOC) is to monitor, prevent, detect, investigate, and respond to cyber ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
什麼是資料外洩防護 (DLP)
Data Loss Prevention (DLP) is a set of strategies, procedures, and tools that help prevent the access or ...
閱讀更多內容 5 minute read
What is Antivirus
Antivirus software is a class of applications that protect computers and remove malicious software or code designed to ...
閱讀更多內容 2 minute read
什麼是端點防護?
Endpoint protection involves monitoring and protecting endpoints against cyber threats. Protected endpoints include desktops, laptops, smartphones, tablet computers, ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品
Ransomware Attack - What is it and How Does it Work?
In 2025, ransomware has evolved significantly past simple file encryption. While denying access to your data by encrypting it ...
閱讀更多內容 15 minute read
什麼是惡意軟體?
A portmanteau of “malicious software”, malware is software designed to achieve malicious purposes on an infected computer. Essentially, ...
閱讀更多內容 閱讀時間 6 分鐘長的閱讀小品
什麼是駭客行動主義?
Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the act of hacking, or breaking into a ...
閱讀更多內容 閱讀時間 3 分鐘長的閱讀小品
什麼是 Botnet?
A botnet is a network of infected computers that work together to carry out an attacker’s goals. ...
閱讀更多內容 閱讀時間 4 分鐘長的閱讀小品





