Malware Resources

Malware news and support resources, featuring the hottest solutions, technologies and vendors in the Malware world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

  1. Home
  2. Tag "Malware"

Citrix Video on how to Recover from malware and ransomware

Citrix Systems
We live in an era where ransomware and malware attacks are constantly making headlines. It seems like the electronic world we know is under constant attack. These attacks can cost millions, even billions in lost revenue, leaked information, and productivity. Cybersecurity – it’s top of mind for every organization. When it comes to providing SECURE […]

Microsoft: Detecting in-memory attacks with Sysmon and Azure Security Center

Microsoft
In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and Hunting for in-memory .NET attacks. These attacks involve the attacker carrying out malicious activities entirely in-memory, rather than writing a file to disk – as […]

Windows 10 App Control with VMware Workspace ONE

VMware
Preventing malware or non-corporate approved apps in your organization can be simplified with VMware Workspace ONE, powered by VMware AirWatch unified endpoint management through configuration of the App Control profile. AirWatch can prevent the downloading or execution of already installed or any store app on the device such as Netflix, Facebook, or Twitter. Learn more […]

Citrix Video: Upload Protect against zero day threats and malware video

Citrix Systems
Ransomware, phishing attacks, and zero day exploits are the biggest nightmares facing IT today. You’ve seen it in the headlines, hackers targeting organizations, with all kinds of malware designed to not only steal sensitive data, but to encrypt it and hold it for ransom. But Citrix can help stop these attacks on day zero. Watch […]

Citrix: 5 Ways to Avoid Shadow IT

Citrix Systems
Shadow IT— technology used within an organization without explicit approval — is the modern Trojan horse. It can allow ransomware and malware to invade your network, cause data leaks and even introduce compliance risks. Here are five easy ways to avoid shadow IT: 1. Understand the risks Part of what makes the threat of shadow […]

Cisco: Data Center Application Layer Attacks

Cisco
There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs.  Data center outages can occur from a number of factors such as such as component quality issues, power supply disturbances, or human […]

Microsoft: Defending Against PowerShell Attacks

Microsoft
The security industry is ablaze with news about how PowerShell is being used by both commodity malware and attackers alike. Surely there’s got to be a way to defend yourself against these attacks!There absolutely is. PowerShell is – by far – the most securable and security-transparent shell, scripting language, or programming language available. Our recommendations are: […]

Cisco: Ransomware – What it is, how to avoid it and what to do if it gets you

Cisco
Ransomware has been all over the news since 2015. You’d think we would all know how to deal with it and the fad would be dying by now.  Well, that’s what I would think.  It turns out that ransomware generates a lot of cash for criminals, an estimated $1 billion in 2016.  It also has […]

The Application is the Endpoint

Bromium
Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do […]

Ransomware history – brief guide

Veeam
Ransomware attacks are not a fake threat – they are real and increasing day by day. The below insights on ransomware history can help you understand the evolution of its delivery and extortion strategies and be better prepared in case you become the victim of an attack. Ransomware, locker or crypto-malware, has been around for […]

Gartner: 2018 Planning Guide for Security and Risk Management

Gartner
Our team has just released our annual security planning guide: “2018 Planning Guide for Security and Risk Management.” Every Gartner GTP customer should go and read it (in fact, the above link requires just such a subscription…)The abstract states: “Although security has been a major challenge for digital business for many years, recent events mark […]

Cisco: When it Comes to Network Security, Your Best Defense is Security Everywhere!

Cisco
New troubling cyberattacks are in the news almost daily. No one is immune. Have you checked your credit score lately? I just finished freezing mine. A national credit bureau breach is the latest wide-ranging theft of data to hit the news. You are probably wondering: “Is my network secure and what would happen if we […]

Ransomware Basics – Part 4

ManageEngine
A cornerstone of any resistance to malware is user education. Administrators and other IT staff do not fully understand the complexities of computers, as computers make sense and are quite simple. The normal user does not feel this way about a computer, so education on how to behave with regard to attacks is important. Ransomware, […]

Adobe releases patches for eight critical security vulnerabilities

ManageEngine
ManageEngine’s own security and patch expert Mike is back at it again with a report on new vulnerabilities in three different Adobe products. According to Mike, there are two vulnerabilities in Flash Player, four in ColdFusion, and two in RoboHelp. Out of these eight vulnerabilities, five are marked as critical. Although there are no reports of hackers taking […]

Visit Our Sponsors