Security Experts:

long dotted


China-based threat actors are using sophisticated malware installed on handheld scanners to target shipping and logistics organizations from all over the world.
The notorious file-encrypting CryptoLocker ransomware hasn't been active since the latest takedown operation, but its delivery network is still up and running.
OpenDNS has enhanced its cloud-based network security service Umbrella with new capabilities designed to protect organizations against targeted attacks.
Cybercriminals are using thousands of compromised computers to target point-of-sale (PoS) systems from which they can steal payment card information, FireEye reported on Wednesday.
Facebook's Threat Infrastructure team recently helped take down the Lecpetex botnet, which affected thousands of accounts.
An Israeli company with ties to Ukraine is believed to be involved in the creation of a piece of malware, which it has distributed with the aid of adware.
Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.
The IEEE announced the launch of a new service designed to help the security industry respond more efficiently to the modern malware threat landscape.
A new 64-bit version of the KIVARS Trojan has been analyzed by researchers from Trend Micro and comes with a number of enhancements in addition to being able to run on computers running 64-bit operating systems.
A new version of the Cridex malware combines a self-spreading infection method–effectively turning each bot in the botnet into a vehicle for infecting new targets.


rss icon

Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Aviv Raff's picture
There are four key reasons why cloud-based sandboxes are qualitatively more effective than on-premise appliances...
Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.
Wade Williamson's picture
Security in the era of APTs is everyone’s problem, and to truly adapt means each team in an enterprise has to push itself out of its traditional comfort zone. Let’s look at some of these challenges.
Shaun Donaldson's picture
What is it about public cloud that breaks traditional endpoint security? First, let’s consider how traditional endpoint anti-malware ended-up where it is today.
Marc Solomon's picture
To detect, understand and stop advanced threats you need new tools and techniques that enable you to always watch, never forget and take action should a file be determined to be malicious at a later time. In effect, you need to be able to turn back time.
Marc Solomon's picture
Defenders need a new threat-centric approach to security to address the full attack continuum – before, during and after an attack – with continuous visibility into indicators of compromise and retrospective security to quickly contain and stop the damage.
Wade Williamson's picture
It’s important we remember that IT security is essentially an asymmetric struggle. If we don’t adapt, we simply play into the hands of those who want to attack us.
Marc Solomon's picture
In this continuously evolving threat landscape you need to ask yourself: Am I using the right criteria to determine how to better protect my organization from advanced attacks?