Digital Guardian Sees Through Data Protection Evasion Techniques (Video Demo)
Watch this video demo to see how Digital Guardian protects data from insider threats.
Detecting and Mitigating USB Propagating Malware (Screenshot Demo)
Put those hot glue guns away – here’s how to detect and mitigate USB propagating malware.
A Good Phishing Attack is Worth a Million Zero-Days
Dridex keeps coming back with a vengeance - let's take a look at how the malware works and what can be done to stop it.
Detecting CryptoWall 3.0 Using Real Time Event Correlation
Today we’re sharing a use case from the DG Lab in which we detected a variant of the CryptoWall 3.0 ransomware by correlating indicators of compromise within system process calls in real time.
Know Your Network First: DNS and the Power of Feature Classification
Looking to build a threat intelligence program at your company? Knowing and understanding your network is a critical first step. Let's get started!
Recent Breaches, Alerts Call for Improved Defense Against POS Malware
Cyber attacks relying on POS malware have made a major resurgence – read on to learn about some new developments and incidents involving POS malware as well as tips for protecting POS systems against data breaches.
Podec Trojan Marks Spike in Malware Distribution via Mobile Apps, Social Media
The unveiling of the Podec Trojan by Kaspersky once again demonstrates the risks involved with downloading mobile applications from untrusted or unofficial app stores.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!