Software Vulnerabilities April 28, 2016 Understanding EdgeHTML’s Attack Surface and Exploit Mitigations 5 min read - EdgeHTML's large attack surface can be daunting for users. Learn more about possible attacks as well as exploit mitigations that enhance security.
Advanced Threats April 25, 2016 Time Is Money: GozNym Launches Redirection Attacks in Poland 5 min read - The GozNym banking Trojan has pivoted its focus from targeting North American institutions to launching redirection attacks in Europe.
Malware April 14, 2016 Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim 5 min read - The new GozNym hybrid takes the best of both the Nymaim and Gozi ISFB malware to create a powerful Trojan targeting banks in the U.S. and Canada.
X-Force April 12, 2016 Enhancing Incident Response: The Role of Strategic Partners in Your Security Posture 6 min read - Strategic relationships may be an organization's principal source for obtaining essential artifacts in incident response investigations.
Advanced Threats April 7, 2016 Unraveling ZeuS.Maple’s Stealth Loader 5 min read - ZeuS.Maple is a relatively new variant of a stealth loader that enables a few tricks to stay under the radar of security researchers and tools.
Intelligence & Analytics April 4, 2016 The Next Big Thing: Who Drives the Security Agenda? 3 min read - Cybercriminals may be the ones setting the security agenda, but security professionals can collaborate to defeat malicious actors and improve defenses.
Threat Intelligence March 31, 2016 Know Your Enemy: Understanding the Motivation Behind Cyberattacks 2 min read - Understanding the motivation behind cyberattacks — and knowing who could be after your organization — can help you reduce your security risk.
Advanced Threats March 30, 2016 The Silver Lining of a Ransomware Infection 4 min read - If you need a silver lining, think of a ransomware event as a low-cost security assessment pointing out weaknesses in your organization's environment.
Threat Intelligence March 30, 2016 Black Hats and White Hats: If Cybersecurity Were a Western 3 min read - If white hats hope to outduel the black hats, they need to learn to collaborate and share information just as their enemies do.
Cloud Security March 29, 2016 The Bacon of Security: How Threat Intelligence Complements Cloud Protection 2 min read - Threat intelligence is one security seasoning that most people can't get enough of, and now it's being added to cloud security.