Remove Data collection Remove Phishing Remove Threat Detection
article thumbnail

Ransomware en masse on the wane: top threats inside web-phishing in H1 2020

Security Affairs

Web-phishing targeting various online services almost doubled during the COVID-19 pandemic , it accounted for 46 percent of the total number of fake web pages. Secure web- phishing. In the first six months of 2020, CERT-GIB blocked a total of 9 304 phishing web resources, which is an increase of 9 percent compared to the previous year.

Phishing 136
article thumbnail

EDR vs EPP vs Antivirus: Comparing Endpoint Protection Solutions

eSecurity Planet

Who Should Use EDR Solutions EDR is best suited for enterprises that require advanced, real-time threat detection and response. Businesses that require advanced threat detection: EDR provides sophisticated tools for recognizing and responding to complex, developing threats effectively.

Antivirus 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two hacker groups attacked Russian banks posing as the Central Bank of Russia

Security Affairs

In the morning of 15 November, Group-IB detected a malicious mass email campaign sent to Russian banks from a fake email address purporting to belong to the Central Bank of Russia (CBR). Of course, the CBR does not have anything to do with the phishing campaign – the hackers faked the sender’s address. About Silence.

Banking 111
article thumbnail

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

The Last Watchdog

The painful impact of cyber attacks on businesses is worsening despite advances in technology aimed at protecting enterprises from malicious network traffic, insider threats, malware, denial of service attacks and phishing campaigns. This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough.

CISO 140
article thumbnail

Top Threat Intelligence Platforms for 2021

eSecurity Planet

LogRhythm Threat Lifecycle Management (TLM) Platform delivers a coordinated collection of data analysis and incident response capabilities to enable organizations around the globe to rapidly detect, neutralize and recover from security incidents. Key features: De-duplication of data. Collections repository.

article thumbnail

SentinelOne Product Review

eSecurity Planet

SentinelOne is an advanced EDR tool that uses AI-powered threat detection and response. Its patented behavioral and static AI models provide powerful automation for identifying and blocking threats. When threats are detected, it can isolate, quarantine and even remediate issues without human intervention.

article thumbnail

Drawing the RedLine – Insider Threats in Cybersecurity

Security Boulevard

RedLine is a malware service available for purchase on underground forums that specifically targets the theft of sensitive information: passwords, credit cards, execution environment data, computer name, installed software, and more recently, cryptocurrency wallets and related files. Data collection from FTP clients, IM clients.