Featured post

How to Find and Remove the Cyber Attacker that Has Already Breached Your Defenses – White Paper

by on | Leave a comment
Filed under Industry News, Security 101 and tagged , , , , , .

cyber attacker

For enterprises, the current cyber threat landscape is more perilous than ever — and things are only going to get worse.

That’s because not only are today’s advanced threats designed to evade traditional legacy security systems, but the bad actors behind them are highly motivated, fully resourced, and well prepared. Continue reading

Malware, Would You Install it for One Cent?

by on | Leave a comment
Filed under Industry News.

malware for 1 cent

A research study report entitled “It’s All About The Benjamins: An empirical study on incentivizing users to ignore security advice,” has revealed that 22% of users will knowingly download and run what their operating system warns them could be malware, if they’re paid one cent — provided that they don’t think it will diminish their computer’s power. Continue reading

Botnet Evading Traditional Security Methods

by on | Leave a comment
Filed under Industry News and tagged , , .

C

While it’s unlikely that we’ll see a Cyber Crime Awards Ceremony anytime soon (although anything is possible with the rise of enterprise-class malware), if threat actors did bestow such honors upon each other, then this year’s winner of “Most Innovative APT Campaign” might be the Asprox Botnet. Continue reading

Extended APT Campaign Targeted US Airports

by on | Leave a comment
Filed under Industry News and tagged , , , .

APT campaign targets airports

In its 2013 Annual Report, the Center for Internet Security (CIS), a nonprofit group that works closely with state and local governments, has revealed that last year US airports were targeted by an unnamed nation state in a prolonged Advanced Persistent Threat (APT) campaign. Continue reading

NY Times Article Ushers in the Era of Cloud Computing

by on | Leave a comment
Filed under Industry News and tagged , , .

cloud

According to a new article by New York Times journalist Quentin Hardy, the practice of linking and distributing data across multiple machines, and leveraging their collective power to achieve remarkably cost-effective levels of performance, access, speed, and scalability — or more simply put: cloud computing — has now become so prevalent, that it could be on its way to becoming the global norm for corporate data center architecture instead of the alternative. Continue reading

Analyst Calls for “Adaptive Security Architecture” at Gartner Summit

by on | Leave a comment
Filed under Industry News.

adaptive security

As a company founded by network security experts, we have always believed in the competence and accuracy of our vision. However, I will admit that it is particularly satisfying when we come across independent industry analysts who echo our views on an ideal security architecture so completely, that they might have just finished reading one of our resources. Continue reading

Cyber Attack : US Hedge Fund Loses Millions in the “Perfect Crime”

by on | Leave a comment
Filed under Industry News and tagged , .

iStock_000008839191Small

UPDATE: BAE Systems now claims that this previously reported cyber incident was actually an “illustrative scenario” used by the cyber experts inside BAE Systems.

After several months of silence, security researchers from BAE Systems Applied Intelligence have gone public about a cyber attack that cost its unnamed US hedge fund client millions of dollars.

Continue reading

Geodo: New Cridex Version Combines Data Stealer and Email Worm

by on | Leave a comment
Filed under Industry News, Research Lab and tagged , , , .

iStock_000022261355Small

Recent efforts by our Research Lab have revealed new activity related to Cridex. As you may recall, Cridex is a data stealer also referred to as Feodo, and Bugat. The new Cridex version we are seeing now, aka Geodo, combines a self-spreading infection method–effectively turning each bot in the botnet into a vehicle for infecting new targets. Continue reading

What’s Buzzing at the Gartner Security and Risk Management Summit 2014

by on | Leave a comment
Filed under Industry News and tagged , , , , .

iStock_000040569082Small

The Seculert Team and I enjoyed a successful few days at the Gartner Security and Risk Management Summit 2014, as we connect with peers and customers from around the world to demonstrate our award-winning (and certifiably cool!) cloud-based Advanced Threat Protection Platform. We’ll post a full recap on the Gartner Summit along with some photos in the coming days. Continue reading