Ericom Blog

The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

Zero Trust Security in 2023: The State of the Art has Arrived

Why is Zero Trust adoption happening more rapidly than anyone anticipated? What are the positive and negative forces behind this growth?

Read More

Going Bold: Cybersecurity is Not for the Faint of Heart

Ericom's new website features a new design, colors, and logo symbolize the strong protection offered by our cloud-based cybersecurity solutions

Read More

New Variant of Credential-Stealing Browser Malware

The new Zaraza bot successfully decrypts encrypted user credentials stored in browsers and exfiltrates them to Telegram servers for purchase by aspiring cybercriminals.

Read More

With AI, Even Amateurs Can Create Sophisticated Malware

Despite good faith attempts at building in guardrails, generative AI platforms have been successfully coaxed to create undetectable malware.

Read More

New Cyberthreats from Old Vulnerabilities

Newly identified vulnerabilities, especially those that impact widely used software solutions, are big news, as they should be. But over three-fourths of actively exploited vulnerabilities are old ones that organizations have overlooked.

Read More

Playing for Keeps: Hackers Target Gaming and Gambling

Understand why attacks on gaming companies are on the rise and read about solutions that can help protect web-based games from attack.

Read More

Better Together: Ericom Joins Cradlepoint

A letter from Ericom’s CEO, celebrating the company’s acquisition by Cradlepoint and the opportunities it creates for our organizations and customers.

Read More

EvilProxy Broadens AitM Cyberthreat with Phishing-as-a-Service Tool

Adversary-in-the-Middle attacks, which made the news a while ago as new way to bypass MFA, is now available as a service.

Read More

Helping the Public Sector Drive Innovation and Security

SaaS apps, collaboration platforms, and virtual meeting solutions can increase efficiency, they also increase exposure to cybersecurity risks.

Read More

Moving to a Zero Trust isolation-based security approach is faster and easier than you think.

Get a 1:1 Demo