5 threats every Mexican company should beware of

In the network of a company without optimal cybersecurity, a careless click opens the door to horror, one that will cause multiple damages – financial, operational, reputational. … Attivo Networks presents five threats that no Mexican organization should see on its doorstep asking for “calaverita”.   Read the complete list in the PC World Mexico …

5 threats every Mexican company should beware of Read More »

Protecting against Ransomware

Firewalls and classic solutions for endpoint security are insufficient to defend against increasingly sophisticated and targeted attacks against IT infrastructure and applications, warn the security specialists at Attivo Networks. While this combination would offer some protection against common and simple malware attacks , more sophisticated and targeted attacks also require more sophisticated detection and response …

Protecting against Ransomware Read More »


Decoys to Dye Packs: Facing Down Cybersecurity Threats

The days of Jesse James’s train and bank robberies and John Dillinger kicking down doors with his trademark Tommy gun may be long gone, but bank heists are alive and well in the 21st century — albeit with a new flair. Instead of dramatic physical robberies, today’s criminals have shifted the battleground to cybersecurity, infiltrating the networks of financial institutions globally to steal money and personal information. The attacks remain staggering. Back in 2012, individuals and businesses are believed to have lost approximately $78 million during Operation High Roller. Fast forward to today, and the hacking group known as Bandidos Revolution Team is reported to have stolen hundreds of millions of pesos by infiltrating interbank payment systems and hacking into ATMs. Notably, this group is not believed to be connected to another, separate 300-million-peso heist from five banks last year.

Combatting Triton Malware with Advanced Threat Detection

Written by: Mike Parkin, Technical Marketing Engineer – Malware targeting IoT devices is nothing new. There have been some reasonably famous, or infamous, depending on your perspective, IoT targeted malware incidents. An April article on ZDNetby Danny Palmer, on the Triton malware attack in late 2017, highlights the lessons organizations should take away from the incident. He makes some good points, and there are lessons there that apply to securing more than just the IoT space.


New Malware ( SpeakUp ) Leverages Recent Vulnerabilities – And Some Really Old Ones

Written by: Mike Parkin, Product Marketing Engineer – In the first week of February, Catalin Cimpanu at ZDNet and Kacy Zurkus at Infosecurity Magazine reported on a new malware campaign spreading primarily through China, with smaller infestations in South America and other parts of Asia. Known as SpeakUp, it was first discovered by the folks at Check Point on February 4th. The malware payload is a cryptomining program, but that’s not the interesting part of this. What is interesting about this one is the range of targets it can infect and its ability to move laterally after the initial infection.


Losing the cyber security war, more organizations beefing up detection efforts

The battle to keep cyber attackers from successfully compromising networks is not working, according to a recent report by threat detection company Attivo Networks. The company surveyed more than 450 cyber security professionals worldwide from August to December 2018, and more than half of the respondents reported that 100 days of dwell time or more was representative of their organization, while nearly half indicated that their mean time to detection was plateauing or increasing.

Attivo Networks

Attivo Networks® Survey on Top Threat Detection Concerns and Trends Reveals Surprising Findings

Attivo Networks today announced the results of the company’s 2018 Top Threat Detection Concerns and Trends Survey. This survey reveals new insights about top information security concerns related to detecting and stopping attackers, identifying which technologies are impacting attackers, shifts in time to detection, and technologies being used to impact this change. The company surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what’s on their 2019 security wish list.

CSO logo

5 tips to thwart medical device attacks

Carolyn Crandall, chief deception officer for security company Attivo Networks, says, “Healthcare IT teams need tools in their arsenal that not only defend the network perimeter but also help them detect and respond to in-network threats quickly, efficiently, and effectively.” These tools, of course, include a technology Attivo sells: deception software.

BioWorld MedTech Logo

BD and Attivo Partner to Thwart Cyberattacks

As medical devices incorporate connectivity, they provide greater opportunities for convenience, service, and information for consumers and companies, but also are increasingly vulnerable to cyber threats. In this environment, Attivo Networks and Becton, Dickinson and Co. (BD) have validated a deception solution for medical technology cybersecurity threats through a partnership bringing Attivo’s Botsink solution to a select number of BD devices. The two firms collaborated through BD’s Product Security Partnership Program and created “mirror-match decoy authenticity” software for some of BD’s devices, a method designed to redirect an attack from reaching important information or networks.

Scroll to Top