Emotet, one of the most powerful malware-spreading botnets, is active again after a four-month absence, according to several security researchers who noticed a surge in activity primarily against U.S., U.K. and German targets starting on Monday.
Cybercrime is surging thanks, in part, to the availability of inexpensive hacking tools and services. A recent look by security firm Armour at black market offerings finds stolen payment card data, RDP credentials, ransomware and DDoS services are widely available for sale.
ISMG and Cybereason visited Dallas on their "Indicators of Behavior" roundtable dinner tour. And Cybereason CSO Sam Curry says the discussion validated the notion that it's time to reimagine incident detection and response.
Companies and their security departments know that if they haven't already, they need to focus on incident response and threat hunting with a SOC. Still - many are uncertain about how to do so while minimizing risk, maximizing efficiency, and bolstering confidence in a safer future for the IT stack.
There is a key shift in the
threat landscape as attackers focus more on attacking
key endpoints and infrastructure. As a result, many
organizations are developing security blind spots.
Read this ebook to learn more about:
Shifts in threat activity;
Blind spots in cyber defenses & how to regain...
Mike Cotton of Digital Defense sees a key shift in the threat landscape, as attackers focus more on attacking key endpoints and infrastructure. As a result, many organizations are developing security blind spots. Cotton explains how to regain visibility.
Increasingly, cyberattackers are molding
technology and human intelligence
into blended threats that prey upon
vulnerable defenses. Chester Wisniewski
of Sophos lays out how organizations can
become more mature in preparedness
Download this eBook to learn more about:
Attack trends he's...
What makes detecting compromised devices so difficult? The risk of a breach is higher than ever, with countless examples ending up in the news. So how do we detect these infected endpoints faster?
This guide seeks to answer this question and explore the obstacles in identifying infections.
Increasingly, cyber attackers are molding technology and human intelligence into blended threats that prey upon vulnerable defenses. Chester Wisniewski of Sophos lays out how organizations can become more mature in preparedness and response.
How well-equipped is your organization to stop malicious attackers once they're inside your network. According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate stealth attackers before serious damage occurs.
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive's technology is helping these organizations stay ahead of advanced attackers.
Download this report to learn how...
Organizations face a variety of security challenges as they attempt to secure their environments from the ever-changing threat landscape. As they look to gain more insight from their security devices, while gaining improved speed to detect and respond, managed detection and response is becoming a go-to solution.
Multi-stage attacks use diverse and distributed methods to circumvent existing defenses and evade detection - spanning endpoints, networks, email and other vectors in an attempt to land and expand. Meanwhile, individual tools including DLP, EDR, CASBs, email security and advanced threat protection are only designed to...
Is your security team blind to the activities in more than half of its IT assets? That was just one of the findings in a new report from 451 Research, based on in-depth interviews with security leaders across 150 large enterprises and focused on the challenges facing their teams. On average, the report found SIEMs...
This whitepaper takes a close look at what industry-leading Managed Detection and Response (MDR) capabilities are in detail, and establishes a standard by which you can measure your current security service provider and potential MDR vendors against.