The company's research reveals 19.2% of malware attacks used non-standard ports, a year-over-year increase of 8.7%.
Cyber criminals are using malware to hack into devices and use them to trawl the Web, consuming their resources to mine crypto-currencies.
Twenty-five percent of companies in MEA lack cyber security personnel, which is one of the biggest obstacles to cyber security.
Defending against today's critical threats looks back at the threat landscape over the past year.
The update addresses customers’ needs for SMB protocol support, malware protection and improved performance.
Threat hunting helps discover processes, configurations or vulnerabilities which can be acted upon to improve security, says SecureData.
J2 Home Secure and J2 SME Secure provide enterprise-grade managed cyber security for home users and SMEs.
Four workshops will run on 27 May at the Focus Rooms, in Sunninghill.
It takes, on average, 200 days for businesses to identify a cyber security breach, says ITOO.
No business is in a position to identify and patch every zero-day threat in their supply chain, so there are no guarantees, says BT.
Criminal groups are on the lookout for black hat partners in crime who can help them extort money from high-worth individuals, says Digital Shadows.