Critical Strategies for Staying Ahead of Emerging Cyberthreats

Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement, and manage security. Organizations have spent the last two decades updating their security gear to keep up with the latest threats and attack vectors. In the late 1990s, the creation of Continue Reading

Where eagles snap – A closer look

A couple of weeks ago, we talked about snap security, taking a journey through the eyes of a developer and handing over to a user who wants to install applications from the Snap Store. We discussed concepts like application confinement, interfaces, store review, and automatic updates. Today, we will look Continue Reading

How to Achieve Automated, Intelligence-Driven Security

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a Continue Reading

CubeCart 6.1.11 Released

We are pleased to announce the release of 6.1.11. This is a maintenance release with a couple of minor new features. Upgrade is not essential but recommended. What’s New?– 29 resolved issues– Improvements to structured data (Foundation skin)– Ace code editor added to replace code snippet text field. Netsparker Audit ResultPassed Continue Reading

Analyzing Android malware using a FortiSandbox

In this blog post we will analyze a couple of Android malware samples in the Android VM of the FortiSandbox. We’ll also share a few interesting and useful tricks. Running a sample in the VM To run a given sample in the Android VM, you should log into the FortiSandbox, make sure Continue Reading

Evolving towards a Homogenous Society: The Risk of the New Digital Economy

The recent WannaCry attack was interesting for a couple of reasons. First, the speed and scale of the attack was impressive. Over the course of a couple of days, hundreds of thousands of systems were affected and disrupted. Second, it also unveiled a disturbing trend. The attack malware exploited a Continue Reading

Bricker Bot – A Silver Lining to Force Accountability for IoT Security?

The Bricker bot made the news a couple of weeks ago as being responsible for knocking unsecured IoT devices offline, rather than hijacking them into other botnets and using them for a DDoS attack like the massive event we saw last year against DYN. This is the third botnet that Continue Reading

New Era in Anti-Virus Detection Evasions

In the last couple of months, we wrote about the discoveries we found in Dridex, the long-lived banking Trojan that is still quite active in-the-wild. In the blog post, TL;DR, we mentioned the Trojan has equipped with new module that could be used to evade one of the anti-virus products, Continue Reading

10 Steps for Protecting Yourself From Ransomware

If you’ve been listening to the news at all the past couple of weeks, you have undoubtedly heard of a number of companies being affected by ransomware.  The recent surge in this form of cyber attack has many organizations and users understandably concerned. And you should be. Ransomware is nasty Continue Reading

Internet In Danger: Analysis of ISC Bind Patch (part 1)

The Internet Systems Consortium just released a couple of days ago a new patch (version 9.10.3-P4) to fix some issues in the most popular DNS server software in the world. The release note is available at https://kb.isc.org/article/AA-01363/81/BIND-9.10.3-P4-Release-Notes.html In this series of two articles, we will detail our investigation of these vulnerabilities Continue Reading

>