Advertisement
Top

Tag: Detection


Hacker, Network security, Threats & Malware

Attackers increasingly embrace small-scale DDoS attacks to evade detection

November 20, 2019

Via: Help Net Security

The growth in both large- and small-scale DDoS attacks continues its upward trajectory, according to a report released by Neustar. The report reveals that the total number of DDoS attacks was up 241% in the third quarter of 2019, compared […]


Network security

Attackers Are Messing with Encryption Traffic to Evade Detection

May 16, 2019

Via: Dark Reading

Online attackers are trying to obscure their encrypted traffic in an attempt to evade detection, using a technique known as “cipher stunting,” according to Internet infrastructure and security firm Akamai. Cipher stuffing modifies the fingerprint of communications encrypted with secure […]


Network security

Organizations Taking Less Time to Detect Breaches

March 5, 2019

Via: Dark Reading

Internal security teams at enterprise organizations are generally getting better at detecting compromises, but it’s still taking them well over a month to discover them. A FireEye analysis of global breach data from 2018 shows that half of all organizations […]


Network security, Threats & Malware, Virus & Malware

Enterprise Malware Detections Up 79% as Attackers Refocus

January 23, 2019

Via: Dark Reading

A new report on the state of malware shows a spike in B2B malware, with former banking Trojans Emotet and TrickBot topping the list. Enterprise threats ramped up toward the end of 2018 as cybercriminals shifted their strategies to hit […]


Malware, Network security

Researchers Release Free TRITON/TRISIS Malware Detection Tools

August 9, 2018

Via: Dark Reading

BLACK HAT USA – Las Vegas – A team of ICS experts who spent the past year studying and re-creating the so-called TRITON/TRISIS malware that targeted a Schneider Electric safety instrumented system (SIS) at an oil and gas petrochemical plant […]


Network security

11 ways ransomware is evolving

March 30, 2018

Via: CSO Online

Ransomware detection and recovery tools and techniques are getting better. Unfortunately, so are ransomware developers. They are making ransomware harder to find and encrypted files harder to recover. One advantage that security operations have had over ransomware is that it’s […]


Malware, Vulnerabilities

Year-Old Coldroot RAT Targets MacOS, Still Evades Detection

February 20, 2018

Via: Threat Post

Researchers are warning users about the Coldroot remote access Trojan that is going undetected by AV engines and targets MacOS computers. The RAT is cross-platform and capable of planting a keylogger on MacOS systems prior to the OS High Sierra […]


Access control, Network security, Vulnerabilities

Advanced Deception: How It Works & Why Attackers Hate It

December 19, 2017

Via: Dark Reading

While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats. Distributed deception platforms have grown well beyond basic honeypot trapping techniques and are designed for high-interaction deceptions, early detection, and analysis of […]


Virus & Malware

Malwarebytes tracking missed detections in traditional anti-virus

November 7, 2017

Via: CSO Online

Tracking real-world scans on systems over the first six months of 2017, Malwarebytes says that typical desktop anti-virus solutions aren’t cutting it. The company examined detection data from nearly 10 million endpoints, and discovered some of the most notable names […]


Virus & Malware

Mac security facts and fallacies

March 10, 2017

Via: Malwarebytes

The idea that there are no viruses for the Mac goes back to the beginning of Mac OS X, at the very beginning of this millennium. Most people associate this idea most strongly with the “I’m a Mac/I’m a PC” […]


Network security

Consequences of IoT and Telnet: Foresight Is Better Than Hindsight

November 9, 2016

Via: Security Intelligence

Yes, hindsight is often 20/20. But what’s better than hindsight? Foresight. This allows you to prepare for a particular event rather than merely apply the lessons learned from a past cyberattack the next time around. Unfortunately, depending on the significance […]


Malware

Deception mechanisms for detecting sophisticated attacks

October 13, 2016

Via: Help Net Security

Private information stored in document files is the most popular target for attacks coming from professional hackers, according to TopSpin Security. File traps, including Office files, recent docs and deleted docs, were touched the most times during the research. The […]


Network security, Security

Detection and response, where to begin

September 1, 2016

Via: CSO Online

Cambridge, Mass. – As the threat landscape continues to evolve, cybersecurity experts rely more on detection and incident response, making security a collaborative exercise. But, where do they start? Many security executives used the MASSTLC Conference as a launching point. […]


Malware

88% of all ransomware is detected in the healthcare industry

July 28, 2016

Via: Help Net Security

Solutionary found that companies in the healthcare industry had the most ransomware present, accounting for 88 percent of all ransomware detections in Q2. In addition, Cryptowall was the top ransomware variant detected during the quarter, accounting for nearly 94 percent […]


Network security

Hidden in plain sight: Four signs your network might be under attack

May 5, 2016

Via: Help Net Security

It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even years. With increasingly sophisticated, polymorphic malware hitting enterprise networks daily — either […]


Privacy protection

Tor Project says it can quickly catch spying code

March 22, 2016

Via: CIO

The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday. There are worries that Tor could either be […]


Threats & Malware

The Rise Of Community-Based Information Security

December 29, 2015

Via: Dark Reading

The more vendors, service providers, and companies’ band together to fight security threats, the more difficult it will become for attacks to succeed. Security has evolved into a game of detection and response, and the greatest weapon in this new […]


Security

Researchers can identify people through walls by using wireless signals

November 3, 2015

Via: Help Net Security

Researchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) have created a device that allows them to “see” what a person is doing and track his or her movement even if that person is located behind a wall, and […]


Threats & Malware

Knowledge base of malware intelligence enables rapid containment

April 22, 2015

Via: threats-and-malware

The Lastline Knowledge Base (LLKB) launched at the RSA Conference 2015. The new software module can be combined with the Lastline breach detection Platform to give security professionals context around incidents to respond to and defend against active breaches. The […]


Threats & Malware

HP to use FireEye threat detection technology in security products

April 22, 2015

Via: threats-and-malware

#hp #security division is partnering with computer security company FireEye to give it a technological edge in detecting and investigating cyberattacks. FireEye’s #threat #detection and incident response capabilities will be incorporated into HP’s Enterprise Services. The companies are planning to […]