Mitigating Risk From APT41 Attacks Against Networking and Enterprise Infrastructure

Mitigating Risk From APT41 Attacks Against Networking and Enterprise Infrastructure

| | Industry
Earlier this year, researchers at FireEye disclosed a series of attack campaigns attributed to the Chinese hacking group known as APT41. These attacks were notable both for their scale as well as ...

Threat intelligence in a post Covid-19 world. Where do we go from here?

Even before the start of 2020, industry watchers were predicting this would be a decade of digital disruption. Just 7 months in and another “D” has become prominent: “Dependency”. If the Covid ...
Securing the Enterprise From BootHole

Securing the Enterprise From BootHole

| | Industry, research
New threats in the wild combined with the recently disclosed BootHole vulnerability have made securing UEFI Secure Boot a top priority for security teams. The NSA and FBI recently issued a Cybersecurity ...
A Guide to Telecommuting: Adjusting to the New Era of Remote Working

A Guide to Telecommuting: Adjusting to the New Era of Remote Working

Welcome to the new world of telecommuting - the COVID-19 pandemic edition. Learn how to navigate through the world of working from home — especially if you are a first-timer ...
How to Think About GDPR as a Security Vendor

How to Think About GDPR as a Security Vendor

| | Industry
Learn about essential aspects of GDPR, and how security vendors like Castle can provide tools that actually make it easier for app developers to adhere to fundamental GDPR regulations ...

Why Zero Trust reflects today’s challenges

Since Covd-19 started, I probably talked more about Zero Trust than ever before. Not that the concept is new, but the pressure to apply it, suddenly increased dramatically with all the users ...
Detecting Ransomware and Other Threats from Malicious Bootloaders

Detecting Ransomware and Other Threats from Malicious Bootloaders

| | Industry
ESET researchers have recently identified a new ransomware technique being used in the wild in which attackers replace the victim’s legitimate bootloader with a malicious version. The malicious bootloader prevents the compromised ...
Device Integrity and the Zero Trust Framework

Device Integrity and the Zero Trust Framework

| | Industry
Join Eclypsium CISO Steve Mancini and Principal Security Scientist Ryan Clarke for a live webinar discussing this topic on July 28, 2020. Download the PDF > Overview The recent shift to a ...

Threat actors target a vulnerable healthcare industry amid Coronavirus outbreak

| | Blog, Industry
As the outbreak of Covid-19 escalated earlier this month we observed that the global cybercrime community has capitalized on public fear. Initially targeting civilians through phishing campaigns in the guise of the ...
Protecting Consumer Identities Is a Team Effort

Protecting Consumer Identities Is a Team Effort

| | Industry
Responsibility for protecting consumer identities crosses over many teams, but their metrics and goals vary greatly. How do you align teams to better secure users while optimizing your security investment with quick ...