Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in their attempts, according to Fortinet. Upping the ant… Continue reading Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

TLS Fingerprinting: Rethinking Encrypted Traffic Analysis Strategies

 There seems to be some confusion about the appropriate way to use TLS fingerprinting in an environment. Anytime an SSL library, a library that uses any of those libraries, an OS or the application itself is updated or changed, there’s a good possibil… Continue reading TLS Fingerprinting: Rethinking Encrypted Traffic Analysis Strategies

In the New Fight Against Malware, It’s Spy vs. Spy

Cybersecurity teams are in a tough spot. New, insidious types of malware are emerging all the time (more than 800 million total million malware seen in 2019). In many cases, corporate security programs simply don’t have the resources to keep up with t… Continue reading In the New Fight Against Malware, It’s Spy vs. Spy

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy.

However, that is not the way it works. Technology … Continue reading 5 Keys to Improve Your Cybersecurity

Researchers develop new technique to identify malware in embedded systems

A technique for detecting types of malware that use a system’s architecture to thwart traditional security measures has been developed by researchers from North Carolina State University and the University of Texas at Austin. The new detection ap… Continue reading Researchers develop new technique to identify malware in embedded systems

Cybercriminals are becoming more methodical and adaptive

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as time to detection and response to threats, according to… Continue reading Cybercriminals are becoming more methodical and adaptive

Researchers unveil February 2019’s most wanted malware

Coinhive has once again led Check Point’s Global Threat Index for the 15th consecutive month, despite the announcement that its services have been shut down from March 8th 2019. GandCrab ransomware Researchers have also discovered several widespr… Continue reading Researchers unveil February 2019’s most wanted malware

Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its presence from being noticed as long as possible is, na… Continue reading Mining malware evades agent-based cloud security solutions