Malware Resources

Malware news and support resources, featuring the hottest solutions, technologies and vendors in the Malware world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Malware"

The sessions you don’t want to miss at VeeamON 2018

Veeam
0
VeeamON 2018 is only three weeks away and I think it’s time to decide which sessions to add to your agenda. If you haven’t registered yet, you can still grab your ticket! In my last post, I mentioned that the breakout sessions are a major source of learning. Now, with VeeamON just around the corner, […]

Three Considerations on the Road to DRaaS

ClearSky Data
0
Disasters come in many forms. There are the things you think about when you hear words like earthquakes, floods, and other natural events. There are man-made disasters, like power outages and electrical fires. For IT professionals, there are malware and ransomware disasters happening every day. Obviously, no company wants to deal with any of these […]

The Future? It’s Weaponized Malware

Ivanti
0
Without question, hackers today can have a major impact on critical infrastructure worldwide—hospitals, banking systems, the power grid—especially when they’re partnered with aging, vulnerable technology like legacy software. And they appear to be more and more intent on making that happen.   That’s a nightmarish scenario. But cyber attacks are growing in sophistication, and evolving in intent—in no […]

Cisco: Don’t Let Malware Slip Through Your Fingers

Cisco
0
Malware sometimes checks for user interaction as a form of evasion to avoid being detected by antiviruses and other security software, especially sandbox analysis environments. Threat Grid, Cisco’s advanced sandbox analysis environment, has recently added a new feature called User Emulation Playbooks to help ensure malware is properly detected. We will be covering both common […]

Cisco: Debunking the myths of DNS security

Cisco
0
For years, we’ve been pioneering the use of DNS to enforce security. We recognized that DNS was often a blind spot for organizations and that using DNS to enforce security was both practical and effective. Why? Because DNS isn’t optional. It’s foundational to how the internet works and and is used by every single device […]

Cryptojacking and Crypto Mining – Tesla, Kubernetes, and Jenkins Exploits

NeuVector
0
Tesla and Jenkins have become the latest victims of data infiltration and cryptojacking. In the Tesla case, the exploits started when a Tesla Kubernetes cluster was compromised because the administrative console was not password protected. Once an attacker gains admin privilege of the Kubernetes cluster, he or she can discover all the services that are […]

Cisco Introduces a 5G Security Architecture to Enable Secure Network Transformation

Cisco
0
If you’re anything like me, your mobile device is your lifeline, allowing you to be always on and connected to a network.  Smart devices, including our cars and appliances, are now connected to a network. We’ve seen steady advances in wireless technology and now we’re seeing trials of 5G connectivity, a phenomena that’s likely to […]

4 Types of Security Tools that Everyone Should be Using

Devolutions
0
We all know that data breaches are on the rise. Which means that most people are increasing their cyber security IQ, right? Unfortunately, that’s not the case! According to a survey by Pew Research Center, the majority of people are still unclear about some critically important cyber security topics, terms and concepts. To help bridge […]

Citrix: Cryptojacking – How to Avoid This Digital Parasite

Citrix Systems
0
How cryptojacking came to be, what to watch out for, and how Citrix can help you avoid it like the plague! Cryptojacking targets both endpoints and servers – both on-premises and in the cloud. The goal is the same: enslave a massive botnet of devices and harness CPU cycles to mine cryptocurrency with minimal cost […]

Align to SANS Maturity Model, reduce attack surface with virtualization

Bromium
0
Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and micro-virtualization of endpoints proactively minimizes the attack surface to dramatically reduce breaches and false alerts. You’ve heard the saying, “the best […]

Malware copies file to evade anti-virus, detection-based cybersecurity tools

Bromium
0
New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught […]

How to Secure Microsoft Edge browser downloads with Bromium Platform

Bromium
0
Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, […]

Ransomware success and the reasons behind it

Veeam
0
There’s no end to ransomware in sight. It’s a simple enough attack — install malware, encrypt data/system, and ask for the ransom — so why aren’t we stopping ransomware?  Security vendors are keenly aware of the issue, as well as the attack vectors and methods, but can’t seem to stay a step ahead, causing ransomware […]

Bromium Now Provides Application Isolation for Citrix XenServer 7.3

Bromium
0
Bromium now supports Citrix XenServer 7.3 nested virtualization with superior performance. Use application isolation to stop common attack vectors that layered defenses miss. Real-time, high-fidelity alerts trigger the Bromium Sensor Network to provide extended protection. XenServer is an open source platform for cost-effective application, desktop, cloud, and server virtual infrastructures. When Bromium is used for […]

Visit Our Sponsors

Close