4 Key Questions To Determine If Your Endpoint Security Is Up To Snuff
By Joe Malenfant Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool designed to solve all of your endpoint […]
Fortinet Threat Landscape Report Reveals Cybercriminals Successfully Using Common Exploits and „Swarm“ Technology to Attack at Speed and Scale
Fortinet Threat Landscape Report Reveals Cybercriminals Successfully Using Common Exploits and „Swarm“ Technology to Attack at Speed and Scale Source:: Fortinet
Fortinet Threat Landscape Report Reveals Cybercriminals Successfully Using Common Exploits and „Swarm“ Technology to Attack at Speed and Scale
Fortinet Threat Landscape Report Reveals Cybercriminals Successfully Using Common Exploits and „Swarm“ Technology to Attack at Speed and Scale Source:: Fortinet
G DATA Ratgeber – Was ist eigentlich ein Exploit?
G DATA Ratgeber – Was ist eigentlich ein Exploit? Das Bild von der Lücke im Zaun macht sehr gut deutlich, um was es hier geht. Die Software auf Ihrem Computer besteht aus unzähligen Zeilen Programmcode, der – auch wenn vom Hersteller gar nicht beabsichtigt – Schwachstellen und Lücken enthält. Diese Lücken im „Programm-Zaun“ versuchen Kriminelle […]
ROKRAT Reloaded
By Talos Group This post was authored by Warren Mercer, Paul Rascagneres and with contributions from Jungsoo (Jason) An. Earlier this year, Talos published 2 articles concerning South Korean threats. The first one was about the use of a malicious HWP document which dropped downloaders used to retrieve malicious payloads on several compromised websites. One […]
ROKRAT Reloaded
By Talos Group This post was authored by Warren Mercer, Paul Rascagneres and with contributions from Jungsoo (Jason) An. Earlier this year, Talos published 2 articles concerning South Korean threats. The first one was about the use of a malicious HWP document which dropped downloaders used to retrieve malicious payloads on several compromised websites. One […]
#CiscoChat Podcast: Cisco and INTERPOL Join Forces to Fight Cybercrime
By Naveen Menon On 21 November 2017, Cisco and INTERPOL announced an agreement to share threat intelligence as the first step in jointly fighting cybercrime. In this podcast, I talk about the significance of this global agreement signed out of Singapore and how Cisco’s level of security expertise will help law enforcement in INTERPOL’S 192 […]