May 2017

  1. Network Visibility in Cybersecurity
    Thursday, May 25, 2017
    Hacking, theft and compromise often rely on stealth. Exploits can masquerade as part of legitimate-looking emails. Innocuous attachments can contain malicious code. Systems may remain unpatched or still have back doors that become entry points for stealthy intrusions. All of these factors make... READ MORE
  2. WannaCry
    Monday, May 15, 2017
    Early on Friday, May 12, reports began circulating about WannaCry ransomware outbreaks in the United Kingdom affecting numerous sites at the National Health Service (NHS). Soon after, it became apparent that the impact was global, affecting a large number of victims across Europe, Middle East and... READ MORE
  3. Blackmoon malware framework blog
    Thursday, May 4, 2017
    Banking trojans – true to their name – typically steal web credentials from users of financial services websites. Targeted services can include banks, wealth management firms, investment banks, retirement investment services companies and others – essentially any website where money can be accessed... READ MORE