Threats to email security are on the rise. Without sufficient strategies, companies open themselves, their clients and customers to the consequences of cyber security incidents such as phishing, data breaches and business email compromise (BEC)….
Source: www.cshub.com and Read More

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have revealed details about Outlaw, an “auto-propagating” cryptocurrency mining botnet that targets SSH servers with weak credentials. The Romanian-origin malware performs SSH brute-force