For enterprises, the current cyber threat landscape is more perilous than ever — and things are only going to get worse.
That’s because not only are today’s advanced threats designed to evade traditional legacy security systems, but the bad actors behind them are highly motivated, fully resourced, and well prepared. Continue reading
A research study report entitled “It’s All About The Benjamins: An empirical study on incentivizing users to ignore security advice,” has revealed that 22% of users will knowingly download and run what their operating system warns them could be malware, if they’re paid one cent — provided that they don’t think it will diminish their computer’s power. Continue reading
While it’s unlikely that we’ll see a Cyber Crime Awards Ceremony anytime soon (although anything is possible with the rise of enterprise-class malware), if threat actors did bestow such honors upon each other, then this year’s winner of “Most Innovative APT Campaign” might be the Asprox Botnet. Continue reading
In its 2013 Annual Report, the Center for Internet Security (CIS), a nonprofit group that works closely with state and local governments, has revealed that last year US airports were targeted by an unnamed nation state in a prolonged Advanced Persistent Threat (APT) campaign. Continue reading
Cyber attacks on enterprises via Dropbox aren’t new – in fact, we were warning about them last year. However, bad actors routinely adjust their tactics, and this latest ransomware variation is a doozy. Continue reading
According to a new article by New York Times journalist Quentin Hardy, the practice of linking and distributing data across multiple machines, and leveraging their collective power to achieve remarkably cost-effective levels of performance, access, speed, and scalability — or more simply put: cloud computing — has now become so prevalent, that it could be on its way to becoming the global norm for corporate data center architecture instead of the alternative. Continue reading
As a company founded by network security experts, we have always believed in the competence and accuracy of our vision. However, I will admit that it is particularly satisfying when we come across independent industry analysts who echo our views on an ideal security architecture so completely, that they might have just finished reading one of our resources. Continue reading
UPDATE: BAE Systems now claims that this previously reported cyber incident was actually an “illustrative scenario” used by the cyber experts inside BAE Systems.
After several months of silence, security researchers from BAE Systems Applied Intelligence have gone public about a cyber attack that cost its unnamed US hedge fund client millions of dollars.
Recent efforts by our Research Lab have revealed new activity related to Cridex. As you may recall, Cridex is a data stealer also referred to as Feodo, and Bugat. The new Cridex version we are seeing now, aka Geodo, combines a self-spreading infection method–effectively turning each bot in the botnet into a vehicle for infecting new targets. Continue reading
The Seculert Team and I enjoyed a successful few days at the Gartner Security and Risk Management Summit 2014, as we connect with peers and customers from around the world to demonstrate our award-winning (and certifiably cool!) cloud-based Advanced Threat Protection Platform. We’ll post a full recap on the Gartner Summit along with some photos in the coming days. Continue reading