Industry News Blogs - Page 42 of 58 - Attivo Networks

The Art Of Deception: New Class Of Security Startups Use Decoys To Disrupt A Hacker’s Movement

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]By Sandra Kuranda As companies continue to get hammered by breaches, a clear gap in ...
Read More

States taking steps to bolster cybersecurity

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]Two governors this week took executive action to improve their states’ cybersecurity defenses. In California, ...
Read More

How to Stop a Botnet Created by Angler Exploit Kits

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] We all are aware of what a botnet is, and most of us know ...
Read More

The RMS Titanic and cybersecurity

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Little known fact: Yesterday was the 30th anniversary of Bob Ballard’s discovery of the ...
Read More

Reduce the risk of data breaches with new malware detection engine

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Attackers are increasingly capable of modifying their existing malware to slip into a victim’s ...
Read More

IBM warning over ‘Shifu’ banking Trojan that also targets point-of-sale terminals

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] IBM has issued a warning over a new banking Trojan that, so far, has ...
Read More

Lizard Squad hits UK crime agency site with DDoS after arrests

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Hacking group Lizard Squad has claimed responsibility for taking the UK National Crime Agency’s ...
Read More

140 Million Records Exposed in 533 Data Breaches to Date in 2015

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] 140 Million Records Exposed in 533 Data Breaches to Date in 2015 By Paul ...
Read More

How To Respond To a State-Sponsored Cyberattack

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate ...
Read More

Uber Hires Two Engineers Who Showed Cars Could Be Hacked

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Uber is continuing its hiring spree of top technical talent by recruiting two respected ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top