In the world of cybersecurity, many companies that provide protection have moved away from preventing attacks to remediating them after they land. One reason for this is how difficult prevention has become, with new attacks like memory exploits and fileless malware finding vulnerabilities and getting around traditional protection. It’s easier from a defender’s standpoint to
APT3 quietly monitored an NSA attack on its systems and used the information to build a weapon of its own. Chinese threat actor APT3 quietly monitored the US National Security Agency’s use of a highly sophisticated cyber attack tool and then reverse engineered the code to build an advanced Trojan of its own called Bemstour.
From sushi and phishing to robots, passwords and ninjas — and the winners are … Mike Epplin (mepplin), Tampa, Fla., earns the top honors and a $25 Amazon gift card for his apt APT-related caption, inked below by cartoonist John Klossner. When not writing cartoon captions, Epplin’s day job is presales engineer at Respond Software. Second
Preventative technologies are only part of the picture and often come at the expense of the humans behind them. Companies spend millions on security technology designed to prevent cyberattacks, yet they are still plagued by costly breaches and network intrusions. Indeed, the number of attacks are on the rise, taking longer to address than ever
In 2019, there will be no end in sight to email-driven cybercrime such as business email compromise, spearphishing, and ransomware. The year 2018 was another record-breaking year for cyberattacks, and organizations should expect more of the same in 2019. Attackers, who continue to prioritize email as the primary attack vector, are increasingly deploying more sophisticated