Search results: malware

Active Threat Scanning Interface

Uncovering Malware: How Threat Scanning Amplifies Endpoint Protection

The post Uncovering Malware: How Threat Scanning Amplifies Endpoint Protection appeared first on Digital Defense, Inc ...
SANS Webcast - Evasive Ransomware & Malware: How It Works & How to Prevent It

10 Takeaways from the SANS Webcast: Evasive Ransomware & Malware

| | Blog
The SANS webcast uncovers valuable new insights to help organizations combat the ever-growing number of cyber threats.  In our latest webcast,  Evasive Ransomware & Malware: How It Works & How to Prevent ...
IBM Gootloader ransomware

Behavior-Based Detection Can Stop Exotic Malware

To stay a step ahead of cyber defenders, malware authors are using “exotic” programming languages—such as Go (Golang), Rust, Nim and Dlang—to evade detection and impede reverse engineering efforts. Unconventional languages are ...
Security Boulevard

Why Antivirus is Not Enough & the Sandbox is Dead: Turning the Corner with Malware Prevention

| | Blog
Many organizations think their files are safe because they have antivirus or sandbox security. While these technologies are undoubtedly relevant for threat prevention, each has its gaps that can be exploited by ...
15-Year-Old Malware Proxy Network VIP72 Goes Dark

15-Year-Old Malware Proxy Network VIP72 Goes Dark

Over the past 15 years, a cybercrime anonymity service known as VIP72 has enabled countless fraudsters to mask their true location online by routing their traffic through millions of malware-infected systems. But ...

Understanding Supply Chain Attacks

Is your company prepared for a supply chain attack? Find out what supply chain attacks are, along with best practices to protect your business from being victimized ...
Bejamas - Armorblox RSS Feed - Title !
Thoughts on the FinSpy Bootkit

FinSpy UEFI and MBR BootKit

| | Industry
After examining the depths of device firmware and hardware security for many years, yesterday’s publication of FinSpy bootkit activity comes as no surprise. This development is simply one more reason why firmware ...

.NET 5, Source Generators, and Supply Chain Attacks

|
IDEs and build infrastructure are being a target of various threat actors since at least 2015 when XcodeGhost has been discovered - https://en.wikipedia.org/wiki/XcodeGhost - malware-ridden Apple Xcode IDE that enabled attackers to plant malware in iOS applications built ...
Complete 66 Mac vs PC ads + Mac & PC WWDC Intro + Siri Intro

How Bill Gates saved Microsoft 20 years ago

| | Blog
Before his career as a philanthropist, Bill Gates was the founder and head of Microsoft who became as famous for his relentless pursuit of growth as he had for inventing the commercial ...
September Firmware Threat Report

September Firmware Threat Report

| | threat report
Spyware found embedded in UEFI and MBR firmware - ran undetected for years ...

Secure Guardrails