A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Hidden motivations in separate but similar destructive events
Recently, there have been discussions around the topic that if our product is installed, ExPetr malware won’t write the special malicious code which encrypts the MFT to MBR.
How to gain visibility and control of data in cloud apps.
Read how can you add secure access and mobile management through Enterprise Mobility Security (EMS), you can build a framework to protect your users, devices, apps, and data across your entire organization
Learn how Microsoft Enterprise Mobility Security (EMS) can help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world.
Microsoft Intune gives you a diverse set of tools for managing your complex mobile environment. Intune’s innovative combination of mobile application management and device management options gives you flexibility in how you manage and secure mobile productivity.
The adoption of mobility and cloud services has changed the way business users interact with their devices, apps, and corporate data, increasing the options for users to connect and be productive at any time.
While classification policy affects the security posture of all data transfers within an organization, the placement of company information on a publicly accessible platform could potentially be a compromising action that can be taken with sensitive content
Learn how can data classification help banks, insurers and other financial service companies ensure their data remains safe
The golden age of Trojans and viruses has long gone.
Keep your business soaring with identity and access assurance
This analyst report explores the response organizations must marshal to stand up to the threat of industrialized cybercrime.
Oracle's research report A Secure Path to Digital Transformation shows security professionals understand the imperative to transform, and reveals the extent to which they see cloud as a secure option of doing so.
Being a malware researcher means you are always busy with the struggle against mountains of malware and cyberattacks around the world.
A gut feeling of old acquaintances, new tools, and a common battleground
While the (cyber-)world was still shaking under the destructive ExPetr/Petya attack that hit on June 27, another ransomware attack targeting Ukraine at the same time went almost unnoticed.
There are many different methodologies & controls to improve cyber security defense, which can improve current security controls. But are they adequate in protecting users & client computers?