Security Evasion and Customized Malware Has Become Mainstream for Attackers of all Skill Levels...
Hi, what are you looking for?
Security Evasion and Customized Malware Has Become Mainstream for Attackers of all Skill Levels...
Last week Mandiant released a powerful report that exposed what certainly appears to be a state-sponsored hacking initiative from China, dubbed by Mandiant as...
Last week Google announced the details of the third iteration of Pwnium, Google’s contest where it gives cash to security researches who can demonstrate...
The Internet has made virtually any information accessible to someone who is determined to find it. This is great when you need to quickly...
It’s no surprise to anyone practicing security today that the threat landscape has grown increasingly complex. Modern attacks weave together exploits, malware, applications and...
Its no secret that modern data centers are in the midst of an ongoing period of very dynamic evolution that has fundamentally changed the...
Last week, Microsoft released the latest Microsoft Security Intelligence Report (SIR), which provided some interesting empirical insight into malware and how it is distributed on...
When Defending Against Today's Threats, It's Important To Know If a Particular Security Solution Is Ready For The Front Llines of The Network.
In Network Security We are Always in a Battle of Wits Against the Attackers...This week marks the official start of a new school year...
If Your Organization Has Information That is Valuable Enough to Keep Private, Then There is Value For An Attacker in Stealing It...
The More We Understand About How the Bad Guys Operate, The Better off We Will Be...
For many years network security has taken something of a primarily reactive, top-down mentality to dealing with threats. For example, when a new malicious...
While The Immediate Risk of "Flame" is Low, Attackers Could Adapt Its Techniques and Repackage Them Into New Malware
Jericho Botnet Analysis: Infection, Persistence and Malicious FunctionsWe’ve talked a lot about modern malware as a concept, but I’d like to use this week’s...
When it Comes to DDoS Attacks, it’s Important to Remember That There Will Likely Never be a Single Silver Bullet.
Network attacks and breaches have dominated the technical and mainstream news for the past 18 months, as attacks have grown both in volume and...
Microsoft made lots of news recently with the disclosure that a key vulnerability (MS12-020) involving the RDP protocol had been leaked, apparently from Microsoft’s...
If we don’t have a solid notion of what is normal in our environments, it’s highly unlikely that we will notice the new threat...
Botnet takedowns are good for the industry, but our local controls are really the only security measures that we can rely on to protect...
There are Tons of Applications and Code out there that are not Overtly Malicious, yet do Spyware-like Things Without the user’s Knowledge and Reduce...