Date

Education and Professional Services

Displaying 3031 to 3060 of 4372

Federal data center modernization lacking key security components

Government-trained security company Morta Security has been snapped up by Palo Alto Networks for an undisclosed sum. The acquisition was announced on Monday and arms Palo Alto Networks with a company whose staff hail from the National Security Agency, US Army, US Air Force, and others.
  • 0
  • 1963

Filmkan: Mysterious Turkish Botnet Grows Through Facebook

On January 31, a security researcher named Mohammad Faghani posted an analysis of malware that was being distributed through Facebook posts. Based on the number of “likes” the malware had generated, Faghani estimated that over 100,000 users had been infected with the malware. We have not been able to identify a common name for this
Ryan Olson,
  • 0

Govt moves to protect cyber networks

  • 1
  • 1959

Threat Prevention and Security Automation to Stop Damaging Attacks

The volume of malware alerts received by security teams in Financial Services can now reach into the tens of thousands daily. Properly addressing these requires tools and security products that deliver a high degree of automation and eliminate many of the manual tasks that security teams still have to deal with when using traditional products.
  • 0
  • 523

Dangerous Online Advertisement

  • 0
  • 2017

Analysis: CryptoWall 3.0, Dyre and I2P

For a moment, put yourself in the shoes of a cyber criminal. You’ve collected an array of tools (malware), built up your infrastructure (command and control (C2) servers) and you have a process to make money off your hard work. You wake up on Monday morning and the domains your carefully built malware uses for
Ryan Olson,
  • 0

How To Protect Yourself From the Latest CTB-Locker Campaign

CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim’s endpoints and demand ransom payment to decrypt the files back to their original state.  Earlier this week we detailed a new CTB-Locker campaign and why legacy security products won’t protect enterprise networks. In this blog post we will detail
Tomer Bar,
  • 0

Newest CTB-Locker Campaign Bypasses Legacy Security Products

Introduction CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim’s endpoints and demand ransom payment to decrypt the files back to their original state, but most antiviruses detect it by mistake as CryptoLocker (only one vendor correctly detects it as CTB-Locker). The attack vector is very basic and repeats
Tomer Bar,
  • 0

Palo Alto Networks - Beyond Tradition

  • 0
  • 3208

Banking Trojan resurfaces in January attacking via email

Government-trained security company Morta Security has been snapped up by Palo Alto Networks for an undisclosed sum. The acquisition was announced on Monday and arms Palo Alto Networks with a company whose staff hail from the National Security Agency, US Army, US Air Force, and others.
  • 0
  • 2013

Exposing Common Myths Around Cyberthreats to SCADA and ICS

While awareness over the need for improved cybersecurity in SCADA and Industrial Control Systems (ICS) has improved in recent years, several inaccurate and dangerous assumptions about ICS cybersecurity best practices and the nature of cyber threats still persist. If held by organizations as fact, these myths could result in inadequate cyber-defensive measures and a high level of exposure to a range of attacks or even simple accidental cyber incidents both of which could have equally concerning consequences to process availability and safety.
  • 2
  • 482

Bringing Security to Mobile Computing

ทุกวันนี้อุปกรณ์พกพา ได้เข้ามามีบทบาทในการทำงานของพนักงานในองค์กรและก่อให้เกิดการเปลี่ยนแปลง ที่คุณจำเป็นต้องทำให้องค์กรมีความปลอดภัย. ตอนนี้เราเผชิญกับคำถามที่ว่า จะทำอย่างไรให้พนักงานสามารถใช้เครื่องมือที่พวกเขาต้องการ โดยในขณะเดียวกันจะต้องดูแลเรื่องความปลอดภัยของทั้งเครือข่าย, ข้อมูล และแอพพลิเคชั่นบนอุปกรณ์
  • 0
  • 214

Combat APTs with Palo Alto Networks

Advanced Persistent Threats (APTs) เป็นภัยคุกคามทางไซเบอร์ที่ก่ออันตรายต่อองค์กรทั่วโลก ด้วยความซับซ้อนและหลากหลายในการโจมตี เชิญร่วมงานสัมมนาผ่านทางเวปเพื่อรับข้อมูลเชิงลึกของการโจมตีประเภทนี้
  • 0
  • 416
Displaying 3031 to 3060 of 4372