> Home

malware threats

Results 1 - 25 of 166Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. But, did you test the anti-malware solution yourself? In this book, we explain how artificial intelligence (AI) can help your enterprise combat malware threats in a more preventative, proactive, and radically better way than legacy anti-malware products. We explain why you shouldn't just believe a vendor's marketing. Instead, you should test different solutions for yourself, just as you would with any other major security investment. Read more in this eBook.
Tags : 
anti, malware, testing, generation, data, security
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection, anti spam, anti spyware, anti virus, internet security, security management, web service security, data protection
    
ESET
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware, security
    
Webroot
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss, security
    
Vectra Networks
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring, access control, anti virus, application security, authentication, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud, access control, anti spam, anti spyware, anti virus, application security, authentication
    
Blue Coat Systems UK
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jul 26, 2017
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Tags : 
cyber attacks, data breach, advanced data analytics, malware
    
IBM
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
You’re aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Tags : 
malware threats, cyberespionage, security technologies, security, it management, knowledge management, data management, business intelligence
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Virtualization promises to boost efficiency and cut costs, making it an important element in your IT department’s efforts to do more with less. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk.
Tags : 
virtualization, cyberthreats, security software, security solutions, security, it management, knowledge management, business intelligence
    
Kaspersky Lab
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring, anti spam, anti spyware, anti virus, application security, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
    
Blue Coat Systems
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage
    
Damballa
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Home