Threat Explainer

Making sense of the threat landscape

Our Threat Explainer blog series will help you learn more about how security threats work. Each topic starts at the foundation and builds your knowledge layer by layer, keeping you well informed about the latest security topics.

Threat Explainer blog series

Explorations in the spam folder—holiday edition

Learn all about the spam campaigns that are circulating this holiday season.

Supply chain attacks

Learn how bad actors can target the companies you rely on in order to get at your organization.

RDP and the remote desktop

Remote Desktop Protocol (RDP) is popular, but is it the best option for connecting to your company resources?

Remote work and the threat landscape

Attackers are adapting their techniques to target those working from home. Learn how to mount a better defense.

Securing the remote work environment

Working from home isn't the same as working from the office. Here's why you should review your remote working security posture.

Credential dumping

Phishing and keylogging are just the beginning. Explore more techniques adversaries use to steal passwords and credentials.

Exploring the spam folder

Phishing, scams, and Trojans: Find out which are likely to be in your spam email folder.

Securing industrial IoT

Find out why industrial IoT is vulnerable and learn how to defend manufacturing, critical infrastructure, and more.

Malvertising

Learn how adversaries infiltrate ad networks with malicious advertising and get tips for safe online shopping.

Remote access Trojans

Check under the hood and see how a remote access Trojan (RAT) works and what is at stake.

Threats in encrypted traffic

Learn how adversaries hide their malicious activities online.

DNS under attack

Take an in-depth dive into Sea Turtle and other DNS attacks.

Office 365 phishing

Get a step-by-step breakdown of this phishing tactic and learn how you can protect your email.

Social media and illegal market

Learn about the criminal groups operating on social media and the implications for your online security.

The rise of digital extortion

Learning about this targeted phishing scam can go a long way toward reducing its impact.

SMB and the return of the worm

Find out how SMB works, how bad actors can exploit it, and what you can do to reduce its risk as a threat vector. 

Cryptomining: A sheep or a wolf?

Explore what malicious cryptomining is, how it gets on devices, and what should you do about it.