Traditional perimeter defenses are having a hard enough time keeping up with the dynamic nature of cloud and mobile connections with corporate assets.
Traditional perimeter defenses are having a hard enough time keeping up with the dynamic nature of cloud and mobile connections with corporate assets.
Perhaps nothing, not even the weather, changes as fast as computer #technology. With that brisk pace of #progress comes a grave responsibility: securing it. Every wave of new tech, no matter how small or esoteric, brings with it new threats. The #security community slaves to keep up and, all things considered, does a pretty good […]
I recently obtained a PoisonIvy sample which uses a legitimate application in an effort to stay under the radar.In this case, the PoisonIvy variant detected as BKDR_POISON.BTA (named as newdev.dll) took advantage of a technique known as a DLL preloading attack (aka binary planting) instead of exploiting previously known techniques. The malware was located in […]
Latest Comments