March 20, 2017 Transform Your SOC with Managed Services Using Carbon Black and QRadar 3 min read - Carbon Black is a leader in next-generation endpoint security, and its products are initiating an evolution in SOC process and procedure.
March 20, 2017 Unraveling GootKit’s Stealth Loader 2 min read - GootKit is an ongoing malware project that affects the three most popular browsers: Internet Explorer, Mozilla Firefox and Google Chrome.
March 16, 2017 Petya Ransomware Gets Hijacked 2 min read - A new version of Petya ransomware, called PetrWrap, has been spotted by security researchers. This Trojan leverages old tricks to make fast money.
March 16, 2017 New POS Malware Leverages Modular Sleight of Hand to Exfiltrate Card Data 2 min read - Time for a show? New POS malware MajikPOS uses modular sleight-of-hand tricks and a variety of methods to gain system access for credit card info access.
March 15, 2017 Meet Havyn, the Voice of the Cognitive Security Operations Center (SOC) 2 min read - For the next step in its journey toward the cognitive era, IBM introduced Havyn to provide threat data to IBM Managed Security Services clients on demand.
March 14, 2017 Vehicle Location Services Cloaked in MOPs 2 min read - MOPs may allow a vehicle to cloak its position information from location services by using all radio communication channels available to it.
March 14, 2017 Pre-installed Mobile Malware Targets Android Users 2 min read - Security researchers have detected 36 Android phones with mobile malware pre-installed on the devices, bringing a wave of fresh concerns to enterprises.
March 14, 2017 Got SAP HANA? Your Calendar Just Filled Up With Zero-Day Critical Vulnerabilities 3 min read - SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
March 14, 2017 See No Evil? Facebook Puts the Brakes on Social Data for Surveillance 2 min read - Facebook has updated its privacy policy to stop developers from using social data for surveillance tools — but is this too little, too late?
March 13, 2017 MAC Address Randomization Gets Clobbered 2 min read - MAC address randomization can be defeated with 100 percent accuracy, according to a new report from U.S. Naval Academy researchers.