By Joel Ferman With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.
Source:: Cisco Security Notice
By Joel Ferman With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.
Source:: Cisco Security Notice
By Talos Group Tim Wadhwa-Brown of Portcullis Labs authored this post. In preparation for our talk at Black Hat Europe, Security Advisory EMEAR would like to share the background on our recent research into some common…
Source:: Cisco Security Notice
By Evgeny Mirolyubov Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with…
Source:: Cisco Security Notice
By Brad Garnett While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco…
Source:: Cisco Security Notice
By TK Keanini Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been…
Source:: Cisco Security Notice
Die Verbreitung von Malware ist ein riesiges Geschäft geworden. Den Gesetzen der Marktwirtschaft folgend, muss jede mit großem Aufwand entwickelte Schadsoftware profitabel sein, d.h. möglichst viele Rechner infizieren. Sobald eine solche Software einmal identifiziert wurde, erstellen die Programmierer als „Gegengift“ eine Signatur, die über Antiviren-Programme verteilt wird, um weitere Rechner vor eben diesem Schädling zu schützen. Das wissen natürlich auch die Entwickler von Schadprogrammen und versuchen, z.B. durch den Einsatz von unterschiedlichen Packern, Ihre Programme zu tarnen und somit weitere Infektionen zu erreichen, ohne eine aufwändige und teure Neuprogrammierung zu starten.
Genau hier setzt DeepRay an und versucht mit Hilfe von KI-Methoden den Entpackungsvorgang zu erkennen und direkt darauf zu reagieren. Machine-Learning soll die Methode laufend verbessern und neue Szenerien berücksichtigen können.
In den kommenden Versionen der G DATA Software wird DeepRay als weiterer Sicherheitsbaustein implementiert.
Laden Sie hier das Whitepaper unseres Partners G DATA zum Thema DeepRay.
Fragen zu G DATA als deutschem Security-Pionier beantworten wir gerne:
By Evgeny Mirolyubov Our engineering and research team work 24/7 to ensure business continuity for our customers. Here are the most recent new features and capabilities released for the AMP for Endpoints Console.
Source:: Cisco Security Notice
By Thu T. Pham Threats to energy and utilities firms target enterprise IT networks – here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks.
Source:: Cisco Security Notice
By Talos Group DNSpionage Campaign Targets Middle East This blog post was authored by Warren Mercer and Paul Rascagneres. Executive Summary Cisco Talos recently discovered a new campaign targeting Lebanon and the United…
Source:: Cisco Security Notice
By Jeff Moncrief Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and…
Source:: Cisco Security Notice