Once again, we approach the end of the year with great news. All the way from Tokyo.
All about Virtualization and Cloud Security | Recent Articles:
Ransomware lost its spot as the number one cyberthreat to consumers and enterprises during the first half of 2018, after topping the list for years. Despite being somewhat outpaced by cryptojackers, though, ransomware has made a rapid recovery, showing that file-encrypting malware is here to stay. And all signs point to a 2019 riddled with emerging new threats.
The advanced attack targeting Pakistan described by Cylance mentions an evasion technique that incapacitates the security solutions provided by 8 vendors. Bitdefender products have been successfully blocking this threat since 2016. We conducted our own analysis of this malware and we have new findings to share.
“Survival” is usually associated with stoically pushing on through harsh conditions, symbolized by people like this year’s Nutanix .NEXT keynote speakers -- Bear Grylls and Jane Goodall. But, as technology weaves ever more tightly into our daily lives to support mobility and improve life quality, the term “survival” is also starting to denote the ability to withstand a cyberattack. Bruce Schneider nails it in his security talks – if in the past, a cyberattack could crash your spreadsheet, today, it could crash your car.
The pace of innovation in emerging Cloud technologies is making it more and more challenging for IT practitioners to keep up. It’s time to get ahead! .NEXT On Tour is specifically designed to provide you with insights on the latest in emerging Hybrid-Cloud technologies and how real-world customers are transforming their organizations.
Bitdefender has recently investigated a series of advanced cyberattacks aimed at financial institutions, designed to covertly exfiltrate massive amounts of money in coordinated strikes.
Every year, world’s best security blogs get to compete in the European Security Bloggers Awards, an event part of London’s Infosec Europe. This year, we are honored to be among the finalists in two categories, namely The Best Corporate Security Blog and The Best European Corporate Security Blog.
Recent waves of malicious crypto mining pose new dilemmas in terms of where to draw the line between what is legitimate and what is not. Mining cryptocurrencies has become expensive and coin miners have turned to other people's and companies' devices for resources. As a result, datacenters can and will fall victims to it unless they are prepared to fight off intruders.
Like most groundbreaking inventions, cryptocurrencies bring a moral paradox: while some people consider them a revolutionary tool to make the world a better place, others already use it to fuel their illegal activities. Therefore, it was just a matter of time before this energy-hungry activity became a serious cybersecurity issue.
Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there.
Ransomware, malware, and other elusive attacks threaten companies of all sizes every year, and the attacks are becoming more aggressive and more frequent.
Every company's executive team should be aware of how to prevent these attacks from happening by making security be a "whole company" initiative instead of just an "IT problem".
Targetted attacks and advanced persistent threats have become the new normal in enterprises the world over. As high profile attacks multiply, the need for comprehensive threat intelligence across the organization becomes mandatory.