Posts Tagged 'network security'

Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and intellectual property losses. Many attacks leverage zero-day malware, which are malicious programs that security scanners miss on the day they are used for the first time. Several approaches are commonly used to combat targeted attacks, […]

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post, we examined the evolution of the botnet. In this follow-up we will discuss a new botnet operating model that allows an attacker to get an insider’s view of infected organizations without actually being an insider—all while […]

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more than a decade ago. We […]

Cyber threats have evolved over time to communicate, cooperate, and in some cases directly collaborate among themselves, giving them a distinct advantage over their security counterparts. Hackers possess a culture that is comparatively open, mutually supportive, and largely opportunistic. This has in part contributed to their ability to outpace their security-minded adversaries. This cooperation is an advantage […]

Cybersecurity changes rapidly. Those with valuable insights can better prepare for the shifting risks and opportunities. Intel Security has just released the McAfee Labs 2016 Threats Predictions, a report covering both cybersecurity predictions for the coming year as well as a five-year look forward at the changing security field. Collectively, the report paints a picture of a growing […]