by gcstco | Nov 14, 2021 | Blog, News
To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan files while they’re uploading. How to scan files in a public cloud Ivan YakubovichNovember 11, 2021 Doing business today without big data would be unthinkable....
by gcstco | Nov 11, 2021 | Blog, News
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait. Roman DedenokNovember 10, 2021 Have you disabled annoying e-mail notifications from social networks? We think that’s great! We even periodically offer advice on how to...
by gcstco | Nov 10, 2021 | Blog, News
We based our new threat intelligence management platform on Kaspersky CyberTrace. Mikhail MoskvinNovember 10, 2021 In terms of daily workload, few infosec roles compare with that of a security operations center (SOC) analyst. We know this firsthand, which is why we...
by gcstco | Nov 9, 2021 | Blog, News
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals. Hugh AverOctober 20, 2021 Exactly five years ago, in October 2016, our solutions first encountered a Trojan named Trickbot (aka TrickLoader or Trickster)....
by gcstco | Nov 9, 2021 | Blog, News
Free yourself from social media and start living again. Hugh AverOctober 20, 2021 Social networks becoming a burden? When out-of-control social media taxes your nerves, steals your focus and distracts you from important tasks, it’s time to do a digital detox. Today we...
by gcstco | Nov 8, 2021 | Blog, News
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how. Yaroslav AndreevOctober 22, 2021 The signs of phishing can be obvious — a mismatch between the sender’s address and that of their supposed company, logical...