Viruses & Malware


EDR for Everyone Is about Fighting Alert Fatigue

February 21, 2018 Added by:Liviu Arsene

Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.

Comments  (0)


Crypto-Mining Is the Next Ransomware

January 19, 2018 Added by:Steve McGregory

Since new security threats surface every week, there is a good chance that more devices will be infected with cryptocurrency mining malware in the near future.

Comments  (0)


The IT Security Lessons from 2017

December 22, 2017 Added by:Avishai Wool

A look at the IT security lessons that can be learned from 2017

Comments  (0)


Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)


Healthcare Orgs in the Crosshairs: Ransomware Takes Aim

November 03, 2017 Added by:Sanjay Ramnath

Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.

Comments  (0)


Thinking Outside the Suite: Adding Anti-Evasive Strategies to Endpoint Security

November 03, 2017 Added by:Eddy Bobritsky

Given the recent surge of virulent, global malware and ransomware, anti-evasion defenses are a smart place to start augmenting existing endpoint security by layering on innovative, focused solutions.

Comments  (0)


Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification

October 13, 2017 Added by:Bogdan Botezatu

Fileless malware is completely different than file-based malware in terms of how the malicious code is executed and how it dodges traditional file-scanning technologies.

Comments  (0)


Evasive Malware on the Rise: Time to Stop Stealth Attacks in their Tracks

August 11, 2017 Added by:Eddy Bobritsky

We need to develop and implement creative solutions that are broadly effective at turning “easy target” endpoints into dead ends for hackers and their tricks.

Comments  (0)


WannaCry: How We Created an Ideal Environment for Malware to Thrive, and How to Fix It

July 12, 2017 Added by:Jesse McKenna

How in the world did we end up with a security paradigm where a malware infection can spread so rapidly and so broadly as WannaCry did?

Comments  (0)


NotPetya — 'Ransomware' That Spreads like a Worm

July 12, 2017 Added by:Sean Tierney

NotPetya techniques led researchers to believe the true goals of the attack was disruption rather than monetary gain.

Comments  (0)


Malware Prevention Key to Countering Evasive Attack Techniques

June 28, 2017 Added by:Eddy Bobritsky

We can’t stay in the malware arms race by building a tool for every trick malware creators conjure up. It’s critical that we develop broadly applicable methods that frustrate their efforts by turning those tricks into defensive weapons.

Comments  (0)


WannaCry and Jaff: Two Different Malware Attacks with A Common Goal

June 02, 2017 Added by:Sean Tierney

On Friday, May 12, two separate ransomware attacks were unfolding, each both using different distribution capabilities and malware.

Comments  (0)


The Cyber Car: The Intimate Tango of the 21st Century

May 25, 2017 Added by:Asaf Atzmon

The automotive industry is now at a point of no return. Cyber is here to stay and the industry is very well aware of the vulnerability of connected cars.

Comments  (0)


Adylkuzz: WannaCry’s Older and More Devious Cousin

May 25, 2017 Added by:Kevin Magee

You might be immune to infection by WannaCry because you've already been infected by Adylkuzz.

Comments  (0)


WannaCry Shows World the Need for Endpoint Security

May 24, 2017 Added by:Amir Geri

Ransomware attacks will continue to become more sophisticated and effective as the year goes on. It is now imperative that organizations prepare their networks and devices for a ransomware attack.

Comments  (0)


Is Fileless Malware Really Fileless?

April 13, 2017 Added by:Travis Smith

It doesn’t matter how advanced your adversaries are, the simple defensive measures still matter.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked