<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

The Top 10 RSA 2016 Talks You Can't Miss [INFOGRAPHIC]

Quick Reference:

Cyber-Security in 120 Secs: Malwares on the Rise and Ransomware Hits

In this week’s news, Panda Security reported that in 2015, malware writers produced 230,000 new malware a day, ransomware turned the computer systems off in Lincolnshire County Council for nearly a week, and the US' National Cybersecurity...

enSilo’s Real-Time Data Protection Platform: Now for Mac OS X

It’s time for enSilo’s data protection platform for Mac OS X.

We’re increasingly seeing Mac OS X -based devices entering the workplace. Large development and financial shops - traditionally a Windows OS-based environment, have now got teams...

Cyber-Security in 120 Secs: Malwares, Healthcare Risks and More

In this week's news, an airport in Ukraine discovered a Remote Access Trojan (RAT) on an IT’s computer, Cisco released a report stating that security professionals were less confident in their security infrastructures in 2015 than in 2014,...

Cyber-Security in 120 Secs: 0-days, and a new RAT targeting APJ

 

Silverlight is deemed as being Microsoft’s first 2016 zero-day, TrendMicro’s AV grants any website command-line access, Cyber-espionage in Myanmar with Trochilus RAT, and survey says- over half of Europeans and American company respondents...

Infiltration by Design

Threat actors use several techniques against which we cannot prepare our defenses in advance. I tend to call these techniques “Infiltration by Design”, since attempting to ward off the threat actors using these techniques through...

Cyber-Security in 120 Secs: New Ransomware and Updates to BlackEnergy

It's the first week of 2016 and the industry has already witnessed three newly discovered ransomware and the continuous cyberespionage threat through malware that caused a power outage during Christmas.   

Highlighting the cyber-security...

Cyber Security 2016 Predictions: Amping the Traditional Cyber Kill Chain

I’ve been reading up a lot on 2016 predictions by analysts, peers and other vendors. While I agree with most of these predictions (moving towards a preventive approach, cyber-insurance guidelines will drive security initiatives, addressing...

Cyber-Security in 120 Secs: Backdoors in Juniper Firewalls and More

In this week’s news, Juniper locks the backdoor from an unwanted guest that looks to be state-sponsored.  Landry’s Inc., a restaurant chain is the latest victim of a PoS attack. AV-TEST, an independent software testing company, released...

ArdBot: An Inside Look into Malware in the Making

Crediting R136a1 who published malware samples a few days ago on a forum, we found these samples under development. We quickly went ahead and analyzed one, allowing us a unique view into malware at such an early development stage.