Security experts identify a new worrisome threat vector, but not all of them agree it has legs. Malware operators are always seeking new ways to infiltrate networks without being noticed. Their latest method of where to conceal their ill-intentioned code is inside virtual machines (VM). Sophos researchers have found virtual machine ransomware that hides in a “VirtualBox” to avoid detection [...]
Data Center Knowledge, June 2, 2020, with comments by Satya Gupta An advanced cyber-espionage group is designing malware that can “jump” across air gaps, researchers say. For years, teams have relied on air gapping from the Internet to keep networks protected from cyber criminals and the public Internet. Being gapped from the Web keeps data in an isolated bubble. This [...]
Tech Republic, May 29, 2020, with comments by Willy Leichter Companies are constantly looking for new ways to help their employees handle the drastic changes to how we all work. The month of May was Mental Health Awareness Month and the timing was apropos as the country has faced many challenges, including a major shift in working from home during [...]
Forbes, May 4, 2020, with comments from Satya Gupta Organizations know that antivirus software is outmatched in protecting against today’s malware threats. The threats we’re seeing today have surprised what signatures can see or identify, much less block. Modern malware is capable of continually morphing itself - otherwise known as polymorphic - to escape detection by antivirus signatures and successfully [...]
Business Insider, April 11, 2020, with comments by Satya Gupta “Zooming” has become its own verb that everyone now immediately associates with a conference call app. Colleagues, families, friends, and until recently, schools and universities are using the app in droves to have meetings, collaborate, work and keep in touch during the unprecedented times of COVID-19. Zoom will forever be [...]
PropertyCasualty360, March 25, 2020, with comments by Willy Leichter; As cyberattack risks are set to increase sharply in the coming months and years, no one is immune and many are unprepared. As we see new victims in the daily news falling prey to cyberattacks, public entities are especially vulnerable to cyberattack. They typically don’t have big IT or security budgets [...]
Most Innovative Next-Generation Security, Real Time Security and Zero Day Attack and Exploit Detection & Prevention Last month, Virsec was awarded Info Security Products Guide Global Excellence Awards for each of the categories in which it was nominated. Virsec awards: Gold Award for Most Innovative Next Generation Security Gold Award for Real Time Security Silver award for Zero Day Attack [...]
As people continue to store their personal information on laptops and mobile devices, the world faces the mounting threat of identity theft. In recent years, in fact, cyber crime has reached new heights, as evidenced by the infamous cyberattack on Sony Pictures in 2014, which leaked a large amount of confidential data and prompted the studio to build up better online defenses. As [...]
SC Media, March 2, 2020, with comments from Atiq Raza, Satya Gupta & Willy Leichter Cybersecurity has been around a long time, for the most part living a long life with decent health. But the industry is now whole-heartedly ready for transformation. The industry has experienced incremental change over the years with an influx of products with varying degrees of [...]
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.