online Security

Outsmarting Malware

Outsmarting Malware

Cybersecurity can use adaptable machine learning algorithms combined with several anti-malware technologies to find and foil advanced threats.

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention

Sky Advanced Threat Prevention integrated with SRX Series Services Gateways delivers a dynamic anti-malware solution that can adapt to an ever-changing threat landscape.

An (un)documented Word feature abused by attackers

An (un)documented Word feature abused by attackers

A little while back we were investigating the malicious activities of the Freakyshelly targeted attack and came across spear phishing emails that had some interesting documents attached to them. They were in OLE2 format and contained no macros, exploits or any other active content

Miners on the Rise

Miners on the Rise

Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companies’ business processes suffer because data processing speeds fall substantially.  

SSL cеrtіfісаtе for website security

SSL cеrtіfісаtе for website security

Sесurе Sосkеt Layer (SSl certificate or HTTPS) сеrtіfісаtеѕ wеrе designed and dеvеlореd bу Netscape tо сrеаtе a ѕесurе tunnel whеn transferring ѕеnѕіtіvе data between site uѕеrѕ and wеb hоѕtѕ. 

The future of cyber security

The future of cyber security

The cyber security is always evolving and you, as a business or as a consumer, need to be ready to adapt to the new technologies, regulations and strategies that will help to develop a safer and more secure internet.

Website security a must for your mobiles and tablets also

Website security a must for your mobiles and tablets also

Website Security is a must for your Mobiles and tablets as our phones are not just phones anymore. That ‘phone’ that you use to stay in touch with people is actually a little computer containing valuable information about you, your family, your friends.

Dissecting the Chrome Extension Facebook malware

Dissecting the Chrome Extension Facebook malware

The Facebook malware that spread last week was dissected in a collaboration with Kaspersky Lab and Detectify. We were able to get help from the involved companies and cloud services to quickly shut down parts of the attack to mitigate it as fast as possible.  

Neutralization reaction

Neutralization reaction

Corporate information security services often turn out to be unprepared: their employees underestimate the speed, secrecy and efficiency of modern cyberattacks and do not recognize how ineffective the old approaches to security are. 

Speed: Threats move fast. You have to move faster

Speed: Threats move fast. You have to move faster

Make sure your team can outrace the next cyber threat, with a threat detection and response solution that delivers the insights they need to see threats coming sooner and drive them off faster.

Visibility: If you can't see it, you can't stop it

Visibility: If you can't see it, you can't stop it

With mobile, cloud and the internet of things creating new openings for cyber threats, your organization is at greater risk than ever. So you need more visibility than ever to detect threats and respond to them effectively. 

Updated activity of Spring Dragon

Updated activity of Spring Dragon

The threat actor behind Spring Dragon APT has been developing and updating its range of tools throughout the years it has been operational.

The return of Mamba ransomware

The return of Mamba ransomware

At the end of 2016, there was a major attack against San Francisco’s Municipal Transportation Agency. The attack was done using Mamba ransomware. 

Steganography in contemporary cyberattacks

Steganography in contemporary cyberattacks

A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules

No Free Pass for ExPetr

No Free Pass for ExPetr

Recently, there have been discussions around the topic that if our product is installed, ExPetr malware won’t write the special malicious code which encrypts the MFT to MBR. 

Load More