Kenneth Currin Schuchman, 21, who authorities charged with co-creating the massive Satori botnet that was used to wage several large-scale DDoS attacks, pleaded guilty Tuesday to a single federal charge.
Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets.
Here are the answers you need: what it does, how it gets in, and how to recognize and prevent it.
Download the report.
Several dark web marketplaces are now advertising tax information. The data includes previous years' W-2 forms, form 1040 information and SSNs, among other information. This evolution in tax fraud and tax identity theft is congruent to various dark web economies, including ransomware.
Download this research report...
Mirai, the powerful malware that unleashed unprecedented distributed denial-of-service attacks in 2016, has never gone away. And now a new version has been equipped with fresh exploits that suggest its operators want to harness the network bandwidth offered by big businesses.
The good news for security leaders: Because of SSL/TLS, nearly every bit of web data in transit is now encrypted. The bad news: Threat actors are now masking their attacks inside of encrypted traffic.
Download this eBook transcript of a recent interview with Kevin Stewart of F5 Networks on SSL visibility and learn...
The good news for security leaders: Because of SSL/TLS, nearly every bit of web data in transit is now encrypted. The bad news: Threat actors are now masking their attacks inside of encrypted traffic. Kevin Stewart of F5 Networks explains why network visibility is not enough to detect these attacks.
Organizations must mitigate the threat of malware upload and delivery to
their websites. Oracle Dyn Malware Protection provides the coverage that
every business needs.
Many digital businesses allow file uploads via their websites and web
applications. Site owners permit (and often require) their customers to...
API endpoints have become a weak link in today's enterprise networks. Organizations are deploying Application Program Interface (API)
endpoints at an ever-increasing rate to keep up with the demands of
mobile applications, server-to-server communication, and microservice
requirements. This creates a broader attack...
The traditional way of detecting an advanced malware or threat compromise in a Windows environment using an anti-virus or malware product can be difficult. Learn how the Splunk platform can simplify the process and protect your organization against advanced threats.
Download this report to learn more about:
We all know about May 25 and the enforcement deadline for Europe's General Data Protection Regulation. But what impact will GDPR have on cybersecurity programs? Danny Rogers of Terbium Labs weighs in on the topic.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
Download this thought-leadership whitepaper...
Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.
Cybercriminals are organized, well funded, and highly motivated. They are deploying advanced malware, leveraging cloud-based computing resources, and developing cutting edge tools to attack your organization's data.security defenses.
The proliferation of online devices accessing personal and financial information,...