logo

Articles of Interest

The compiled articles on cybersecurity breaches and incidents provide awareness on current threats and information on how RevBits solutions can help secure companies.

Request a Demo
RevBits PAM: 2-Factor Authentication (2FA) with Yubikey
September 24, 2020

RevBits PAM: 2-Factor Authentication (2FA) with Yubikey

RevBits PAM protects some of your most important information - the credentials you use to access your most sensitive systems and data. To keep your credentials protected, we recommend employing 2-Factor Authentication (2FA) for maximum security. Using a Yubikey is a proven way to deploy 2FA for your account or organization

Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams.
September 22, 2020

Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams

“Cyber-criminals are regularly mimicking the domain names of mainstream global brands to scam consumers, a practice known as cyber-squatting, according to a new study by Palo Alto Networks.”

[Coker, James. “Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams.” Infosecurity Magazine, September 1, 2020, www.infosecurity-magazine.com]

The Tricks Used By WastedLocker To Make It One Of The Most Dangerous Cyber Threats
August 08, 2020

The Tricks Used By WastedLocker To Make It One Of The Most Dangerous Cyber Threats

“One of the most dangerous families ofransomwareto emerge this year is finding success because it's been built to avoid anti-ransomware tools and other cybersecurity software, according to security company researchers who have analysed its workings.”

[Palmer, Danny. “Ransomware: The tricks used by WastedLocker to make it one of the most dangerous cyber threats.” ZDNet, August 4, 2020, www.zdnet.com]

Top Email Protections Fail in Latest COVID-19 Phishing Campaign
July 30, 2020

Top Email Protections Fail in Latest COVID-19 Phishing Campaign

“Threat actors continue to capitalize on fears surrounding the spread of the COVID-19 virus through a surge in new phishing campaigns that use spoofing tactics to effectively evade Proofpoint and Microsoft Office 365 advanced threat protections (ATPs), researchers have found.”

[Montalbano, Elizabeth. "Top Email Protections Fail in Latest Covid-19 Phishing Campaign" Threatpost, April 1, 2020, www.threatpost.com]