Viruses & Malware
Qakbot Trojan Updates Persistence, Evasion Mechanism
May 06, 2019 Added by:Ionut Arghire
The Qakbot banking Trojan has updated its persistence mechanism in recent attacks and also received changes that potentially allow it to evade detection, Talos’ security researchers say. Also known as Qbot and Quakbot, the Trojan has been around for nearly a decade, and has received a variety of changes over time to remain a persistent threat, although its functionality remained largely unalte...
Comments (0)
The Rise of Ransomware and the Consequences for SMBs
February 21, 2019 Added by:Timur Kovalev
Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.
Comments (0)
'DarkGate' Campaign Targets Europeans with Multiple Payloads
November 16, 2018 Added by:Ionut Arghire
A newly discovered malware campaign is targeting users in Europe with various payloads, has a reactive command and control (C&C) system and can remotely control infected machines, enSilo security researchers warn.
Comments (0)
Fight Fileless Malware on All Fronts
November 06, 2018 Added by:Phil Richards
Fileless malware has become the darling of cyber criminals because, quite simply, it’s a no-brainer.
Comments (0)
Ransomware: Keep Safe and Stay Safe
October 09, 2018 Added by:Richard Hummel
Ransomware may not be the threat it once was, but it still poses a risk to the files and systems of businesses everywhere.
Comments (0)
Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers
August 02, 2018 Added by:Liviu Arsene
Pre-execution security technologies coupled with core antimalware technologies can effectively detect and not just block the cryptojacking payload, but also prevent the attack from occurring.
Comments (0)
Memory Protection beyond the Endpoint
July 16, 2018 Added by:Liviu Arsene
Re-engineering security solutions to fit the new infrastructure, performance, and scalability needs of organizations is crucial as advanced threats often exploit security blind spots.
Comments (0)
Every Business Can Have Visibility into Advanced and Sophisticated Attacks
June 18, 2018 Added by:Liviu Arsene
Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.
Comments (0)
Can Organisations Turn Back Time after a Cyber-Attack?
May 23, 2018 Added by:Patrice Puichaud
With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.
Comments (0)
PyRoMine Malware Sets Security Industry on Fire
May 03, 2018 Added by:Boris Vaynberg
Despite all the investments in cyber protection and prevention technology, it seems that the cyber terrorist’s best tool is nothing more than variations on previous exploits.
Comments (0)
EDR for Everyone Is about Fighting Alert Fatigue
February 21, 2018 Added by:Liviu Arsene
Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.
Comments (0)
Crypto-Mining Is the Next Ransomware
January 19, 2018 Added by:Steve McGregory
Since new security threats surface every week, there is a good chance that more devices will be infected with cryptocurrency mining malware in the near future.
Comments (0)
The IT Security Lessons from 2017
December 22, 2017 Added by:Avishai Wool
A look at the IT security lessons that can be learned from 2017
Comments (0)
Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures
December 14, 2017 Added by:Liviu Arsene
Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.
Comments (0)
Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
November 03, 2017 Added by:Sanjay Ramnath
Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.
Comments (0)
Thinking Outside the Suite: Adding Anti-Evasive Strategies to Endpoint Security
November 03, 2017 Added by:Eddy Bobritsky
Given the recent surge of virulent, global malware and ransomware, anti-evasion defenses are a smart place to start augmenting existing endpoint security by layering on innovative, focused solutions.
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider