Remove Malware Remove Network Security Remove Unstructured Data
article thumbnail

New MSSQL Backdoor ‘Maggie’ Infects Hundreds of Servers Worldwide

eSecurity Planet

DCSO CyTec researchers Johann Aydinbas and Axel Wauer are warning of new backdoor malware they’re calling “Maggie,” which targets Microsoft SQL servers. The malware offers a wide range of functionality, including the ability to change file permissions, run commands, and act as a network bridge into the infected server.

article thumbnail

Using Encryption with Access Controls to Mitigate Malware and Ransomware Damage

Thales Cloud Protection & Licensing

Using Encryption with Access Controls to Mitigate Malware and Ransomware Damage. Recently the headlines have been dominated by infected enterprise software that has resulted in malware and hackers gaining access to mission critical infrastructures, taking control of systems, and stealing data. Mon, 12/21/2020 - 07:23.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

eSecurity Planet’s 2022 Cybersecurity Product Awards

eSecurity Planet

Voltage SecureData is a cloud-native solution that’s good for secure high-scale cloud analytics, hybrid IT environments, payment data protection, SaaS apps and more. It protects both structured and unstructured data in use, at rest, in the cloud, and in analytics, checking all the important boxes.

article thumbnail

Top Threat Intelligence Platforms for 2021

eSecurity Planet

It boasts unlimited scalability and queries and offers intelligence on IP and URL reputation, web applications, malware , vulnerabilities and spam. Key Features: Human-generated threat intelligence data. Centralized data platform. It’s augmented by a worldwide team of security analysts who enrich the data feeds.

article thumbnail

Security Data Lakes Emerge to Address SIEM Limitations

eSecurity Planet

What is a Security Data Lake? The typical data lake serves a repository for an organization and holds unstructured data regarding company products, financial data, customer data, supplier data, and marketing information. Also read: Security Considerations for Data Lakes.