Recently, enSilo found an Advanced Persistent Threat (APT) residing in a sensitive network of a customer. This APT appears to be a Remote Access Trojan (RAT) that is capable of taking complete control of the victim’s computer. To date, this APT is unknown and does not appear in VirusTotal. Moker was the file description that the malware author
Recently, we came across Moker, an advanced malware residing in a sensitive network of a customer. Since the malware did not try to access an external server, but rather tamper with the system inner workings, we decided to give this malware a second look. (This kind of work is part of developing complete endpoint security software.)
Highlighting the most significant cyber-security news of the past week in just 120 secs.
Ready, set, go!
Get the most from all the cyber-security news of the past week in just 120 secs.
Ready, set, go!
We're excited to kickstart our weekly roundup of security news from the past week. In these weekly summaries we'll highlight significant points, so you get the most from all the news in just 120 seconds.
Ready, get set, go!
BlackHat talks come in all shapes and sizes – from the philosophical keynotes and high-level to the ultra techie. Narrowing down the list of talks isn’t easy so I chose mine based on their technology flare. If you’re more of the techie sort, I hope this list helps you out as well. The only thing to note is that some unfortunately overlap so
Today’s Microsoft Patch Tuesday includes a patch for CVE-2015-2363, an IMPORTANT-rated exploitable privilege escalation vulnerability which we have responsibly disclosed to Microsoft. CVE-2015-2363 is a nearly 20 year-old vulnerability, located in most Windows systems since Windows NT 4.0 and up to Windows 8.
Today, Microsoft released their latest Patch Tuesday. This Patch includes a fix for CVE-2015-2363, a complementary patch to CVE-2015-2360 from last month. The two CVEs together bundles within themselves IMPORTANT-rated exploitable vulnerabilities which we responsibly disclosed to Microsoft.
Today, we are announcing the completion of our A Round funding led by Lightspeed Venture Partners with an additional investment from our existing backer, Carmel Ventures. The latest threat campaigns and breaches have demonstrated that where there’s a will, there’s a way – a persistent, targeted attacker will eventually succeed to infiltrate an