Remove Architecture Remove Cyber Attacks Remove InfoSec
article thumbnail

GreyEnergy: Welcome to 2019

Security Affairs

Early January, an interesting malware sample has been disclosed through the InfoSec community: a potential GreyEnergy implant still under investigation. The entire malware architecture is modular and very difficult to neutralize. Possible GreyEnergy sample. and “KdfrJKN”.

article thumbnail

2020 Hindsight – Top 10 Highlights from McAfee

McAfee

With the new work from home environment, we released a report uncovering a correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic, along with an increase in cyber-attacks targeting the cloud. To support today’s U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Disambiguate “Zero-Day” Before Considering Countermeasures

Lenny Zeltser

I came across the following reasonable definition of this term in FireEye’s Zero-Day Danger report , which is consistent with how many other security vendors use this term: “Zero-day vulnerabilities are software flaws that leave users exposed to cyber attacks before a patch or workaround is available.”

Malware 68
article thumbnail

Unleashing the Power of a Security Data Lake

SecureWorld News

For example, if a connection to a corporate system originates from an unfamiliar computer or remote location, InfoSec tools may block this operation. Scalable architecture. The advancement of attack sophistication leads to the fact that, over time, it is necessary to collect more and more data from information security tools.

article thumbnail

Behind the Scenes: A Conversation with Virsec’s CTO of the Year

Security Boulevard

Several weeks ago, we were thrilled to learn that our Founder and Chief Technology Officer, Satya Gupta, was named CTO of the Year in the 2021 Global InfoSec Awards. . Beyond that, he drives the basis of our creations and holds 48 patents in complex firmware architecture with products deployed to hundreds of thousands of users.

article thumbnail

How CIOs Can Protect Data Against Ransomware Attacks in 2022

Security Boulevard

Today, the biggest mistake most security practitioners make is treating ransomware attacks as any other cyber attack. Research firm Gartner forecasts that by 2024, a cyberattack will damage critical infrastructure that a member of the G20 intergovernmental forums will reciprocate with a declared physical attack.

article thumbnail

Cyber CEO: A Look Back at Cybersecurity in 2021

Herjavec Group

From Solar Winds to Colonial Pipeline, we’ve seen that the consequences of a ransomware attack don’t just affect the victimized organization – they can have trickle-down effects that impact whole communities, industries and even nations. This includes: Enabling your current cybersecurity team.