Malware Analysis Spotlight: Warzone RAT – Automatically Peeling Away the Layers

VMRay Logo 400x120Countless, easily-configurable malware families give rise, unfortunately, to countless malware samples. Fortunately for researchers, these different samples share functionality and the family can be discerned by looking for similarities, patterns, and heuristics contained within the code. It’s easy to figure out the child when you know what the parent looks like.

Weiterlesen

E-Mails im Unternehmen mit S/MIME verschlüsseln & signieren

VirtualSolutions Logo 400x120

Ob innerhalb des Unternehmens oder extern mit Geschäftspartnern, Dienstleistern und Co – die E-Mail ist das am meisten genutzte Kommunikations-Medium im geschäftlichen Kontext. Dabei werden häufig sensible Informationen ausgetauscht. Um diese Daten abzusichern, ist es wichtig, E-Mails zu verschlüsseln und zu signieren.

Weiterlesen

Anatomie einer Phishing-E-Mail

vadesecureDas Erkennen einer Phishing-E-Mail ist nicht mehr so einfach wie früher. Von sauberem, fehlerfreiem Text bis hin zu scharfen Markenlogos und Bildern – die neuen Angriffe sind sehr erfolgreich darin, sowohl versierte Benutzer als auch fortgeschrittene E-Mail-Filter zu täuschen. Was machen Phisher also anders? Alles – von der Adresse des Absenders bis hin zur Fußzeile.

Weiterlesen

Do Your Part to Stay Safe Online and Start Using a Password Manager

threatquotient logo 400x160Cybersecurity Awareness Month 2020 is about taking proactive steps to enhance cybersecurity at home and in the workplace. One of the best ways you can do this is by practicing good password hygiene – creating unique passwords that are changed frequently for each of the different services you use. However, because it can be a daunting task to keep track of all your credentials, people often make their passwords short, easy to remember and reuse them. 

Weiterlesen

SOAR Solutions Take Off. Check out the 2020 Gartner Market Guide.

threatquotient logo 400x160Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response (SOAR) Solutions reflects the rapid evolution and maturity of the market and SOAR vendors. As Gartner states, “The security technology market, in general, is in a state of overload, with pressure on budgets, staff shortages and too many point solutions.

Weiterlesen

What is Zero Trust Security?

okta logo 400 colorZero Trust is a security framework based on the belief that every user, device, and IP address accessing a resource is a threat until proven otherwise. Under the concept of “never trust, always verify,” it requires that security teams implement strict access controls and verify anything that tries to connect to an enterprise’s network.

Weiterlesen

NC Protect Named Data Security Innovation of the Year

NC Logo Color 400x160I am proud to announce Nucleus Cyber’s NC Protect received the 2020 CyberSecurity Breakthrough Award for Data Security Innovation of the YearThis esteemed award program honors excellence and recognizes the innovation, hard work and success of top companies, technologies and products in the global information security market. This new award comes on the heels of being named 2019 Access Management Solution of the Year by CyberSecurity Breakthrough.

Weiterlesen