Tag: Blogs
-
Protect Your Business from Zero-Day Exploits:
Recently, Chinese government-backed hackers targeted U.S. internet providers using zero-day exploits, adding to a string of concerning …
-
TAG Blog Series 1 – How ADX Supports and Implements Policy
Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing …
-
Understanding Sleep Obfuscation
By ARC Labs contributor, Dylan Michalak, Threat Research Intern Sleep obfuscation is a term encompassing malware that waits for some time …
-
New Qilin Ransomware Attack
A new strain of ransomware, dubbed Qilin, is targeting VPN networks with stolen or harvested credentials. These VPN networks lack basic …
-
Prevention Techniques for Top 10 Common Cyber Attacks
highlight effective prevention techniques to stop those 10 common cyber attacks for even happening to being with! In this article …
-
Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection
This post was written by ARC Labs Contributor, John Dwyer, Director of Security Research at Binary Defense In the first part of this …
-
The Imperative of Threat Hunting for a Mature Security Posture
According to the latest reports, the average cost of a data breach rose to 4.45 million USD which is a 15% over the previous three years[1] …
-
Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks
This post was written by John Dwyer, Director of Security Research at Binary Defense, and made possible through the contributions of …
-
Critical Advisory: OpenSSH Remote Code Execution Vulnerability
What Happened? A critical vulnerability, tracked as CVE-2023-38408, has been discovered in OpenSSH’s ssh-agent, specifically affecting …
-
The Evolving Kill Chain (On-Premise vs. SaaS)
What you begin to see when analyzing the SaaS kill chain vs. the on-premises kill-chain is there are new and difficult areas to focus on. …
-
Understanding Credential Stuffing Attacks
One of the latest concerns in cybersecurity is credential stuffing, a type of cyberattack that is causing headaches for users of Okta’s …
●●●