Malware Resources

Malware news and support resources, featuring the hottest solutions, technologies and vendors in the Malware world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Malware"

Citrix: 3 Steps & 5 Minutes Can Stop a Top Security Risk in Your Organisation

Citrix Systems
0
The fact that human error is the biggest security risk to any organisation should not be news to anyone. However, the notion that a harmless, daily routine for most users is one of the top security risks organisations face today might come as a surprise. Internet browsing — the most common break activity of the […]

Bromium Emotet Banking Trojan polymorphic malware analysis

Bromium
0
We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection. Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. […]

New Hardware Snapshot Orchestration feature for HPE

Veeam
0
The HPE and Veeam partnership brings comprehensive data protection for Hybrid IT. Veeam software integration with HPE storage solutions lets you create application-consistent backups from HPE storage snapshots for fast and efficient data protection. For long-term external storage, HPE StoreOnce provides deduplication for efficient storage utilization and fault isolation for data. In addition, Veeam can […]

Cisco Umbrella – What is it?

IT Blog by Marius Sandbu
0
I’ve just been introduced to Cisco Umbrella now even though I’ve heard the name before, I haven’t actually tried it yet until now.  Umbrella comes from the OpenDNS Business purchase that Cisco did a while back, and is essentially a service to secure traffic trough proxying DNS requests. So in essence it is to setup […]

GDPR offers guiding principles for building a secure IT infrastructure

HP Enterprise
0
GDPR principles may impact your IT infrastructure selection. HPE ProLiant Gen10 servers can help with “privacy by design” innovations that offer best-in-class firmware protection, malware detection and recovery. The European Union General Data Protection Regulation (GDPR)—set to go into effect May 25, 2018—is built on principles that may directly impact your IT environment. While complying […]

Microsoft Office 365 Advanced Threat Protection defense for corporate networks against recent Office exploit attacks

Microsoft
0
The Office 365 Threat Research team has seen an uptick in the use of Office exploits in attacks across various industry sectors in recent months. In this blog, we will review several of these exploits, including a group of Office moniker exploits that attackers have used in targeted as well as crimeware attacks. We will […]

#disruptEUC: IGEL is Driving Innovation in End User Compute. Making VDI and Thin Clients Relevant and Sexy Again!

IGEL Technology
0
About a year and a half ago I joined IGEL, a company few people had ever heard of… and if you had heard of IGEL you were probably German and knew them as a niche thin client hardware manufacturer. Thin Clients? Why should you care? Boring dumb terminals, commodity hardware right? VDI a slow growth […]

Cisco Email Security is Top Solution

Cisco
0
Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organizations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware, phishing or business email compromise attacks. Securing the […]

Citrix: 2018 Predictions in the Content Collaboration Platforms Market

Citrix Systems
0
Progressive leaders in organizations around the world depend on secure access to content for every part of their daily business operations. They are looking for new ways to modernize their way of working by leveraging proven technology to drive successful business outcomes. ShareFile is a leader in the content collaboration space, focusing on security, flexibility […]

The 3-2-1 Backup Rule – Data Protection Strategy

NAKIVO
0
Backups ensure that your critical data will survive any of the likely hazards. Too many individuals and companies have suffered from having their hardware lost or stolen, destroyed by fires or natural disasters, infected with malware or corrupted by targeted hacker attacks. Common sense dictates that all hard drives will eventually fail; the question is […]

Citrix: A Great Time to Take XenServer for a Spin

Citrix Systems
0
As we make our way through the last quarter of the year, I wanted to remind the Citrix community of the significant progress the XenServer team has achieved over the last 18 months to make XenServer the awesome hypervisor that it is today! Have you been hosting your application and desktop virtualization environments on an […]

NeuVector Launches New Version of Container Firewall Security Solution

NeuVector
0
Release enhances Layer 7 container firewall protections, adds new host and container threat mitigation, and speeds enterprise integration NeuVector, which delivers continuous network security for containers, today announced the immediate availability of NeuVector 1.3, the most significant release of the container firewall security solution since its initial launch. Adapting to evolving container security needs, NeuVector […]

Phishing Trojan Campaign Morphs at Scale to Defeat Legacy Detection

Bromium
0
Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

Protect your intellectual property with application isolation

Bromium
0
Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years […]

Visit Our Sponsors

Close