OKTA
-
Okta to Present at Upcoming Investor ConferencesSAN FRANCISCO --(BUSINESS WIRE)--Dec. 3, 2020-- Okta, Inc. (NASDAQ: OKTA), the leading independent provider of identity for the enterprise, today announced ...
-
Okta and Amazon Web Services Bring the Okta Identity Cloud to AWS MarketplaceFurther helps enterprises accelerate adoption of secure cloud infrastructure, broad identity solutions SAN FRANCISCO --(BUSINESS WIRE)--Dec. 2, 2020-- Okta ...
-
Okta Secures the Identities of Banks, Accelerating Digital Transformation in Financial ServicesFinancial services organizations deploy a single platform, the Okta Identity Cloud, to secure their workforces and customers SAN FRANCISCO --(BUSINESS WIRE ...
Comodo
-
Comment on How to Protect Yourself from Printer/Scanner Malware by Jhoney perkerAfter reading this article headline I am worrying that how to protect my scanner from the attack of malware, but the author describes all the protection to save my scanner.I am very helpful to the aut ...
-
Comment on Comodo protects five universities from new malware that steals data by Rocketmail Customer ServiceComodo is one of the best antiviruses of nowadays as in present days it got an exceptionally great performance by protecting from the threat in many universities and private companies, Thanks for shar ...
-
Comment on Comodo 2017 Global Malware Report: Cyber Risks and Geopolitical Threats by Marco SmitThe Comodo Blogs are very welcome. It give an inside in the malware threaths and countries and news is also welcome to improve your own security. ...
Wombat
- Nothing to display ...
Symantec
- Nothing to display ...
Manufacturer Blogs
- Accenture
- AlienVault
- AT&T Network Security
- BlackBerry
- Carbon Black
- Checkmarx
- Cimcor
- Code Dx
- Continuum GRC
- Corero
- CyberArk
- Dark Trace
- Deloitte
- F-Secure Safe & Savvy Blog
- FireEye
- Fortinet
- Gemalto
- Gigamon
- Google Online Security Blog
- Guidance Software
- HackerOne
- i-Sprint Innovations
- IBM Security
- Illumio
- Imperva
- Imprivata
- Inspired eLearning
- KPMG
- Kroll
- L-3
- McAfee Blog
- Microsoft Malware Protection Center
- Mimecast
- Netskope
- Nexusguard
- NNT
- Northrop Grumman
- OKTA
- OneLogin
- Palantir
- Pindrop Security
- Proofpoint
- Pwnie Express
- Qualys
- Radware
- Rapid 7
- Raytheon Cyber
- RSA
- Sailpoint
- SAS Institute
- Secureworks
- SnoopWall
- SonicWall
- Sophos
- SpiderLabs Security Blog
- Telos Corporation
- Tenable Network Security
- Threat Stack
- Thycotic
- Trend Micro
- Veracode
- Verizon Enterprise
- VMware
- We Live Security
- Webroot
- Wombat Security Blog
- Ziften
- Zone Alarm Cyber Security Blog
Fortinet
NetSkope
-
Applying 3 Practical Lessons from the SolarWinds BreachIt’s been more than a month since the SolarWinds breach first started dominating security headlines, and we’re still learning new details about th ...
-
How Netskope Can Help with Your 10 Critical Security Projects – Nos. 9-10The annual list of top security projects from Gartner provides key insights on where security leaders should focus their limited time and resources to ...
-
You Can Run, But You Can’t Hide: Advanced Emotet UpdatesCo-authored by Ghanashyam Satpathy and Dagmawi Mulugeta Summary Emotet has become one of the world’s most advanced botnets. Like many malware campai ...
Demisto
- Nothing to display ...
FireEye
-
Training Transformers for Cyber Security Tasks: A Case Study on
Malicious URL PredictionHighlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
-
Emulation of Kernel Mode Rootkits With SpeakeasyIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If ...
-
Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452In December 2020, FireEye uncovered and publicly disclosed a widespread attacker campaign that is being tracked as UNC2452. In some, but not all, ...
Sophos
-
US administration adds “subliminal” ad to White House websiteHiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!
-
S3 Ep16: Darkweb bust, security at home, and browser snoopage [Podcast]Here's the latest podcast - listen now!
-
Has the coronavirus pandemic affected Apple’s hardware design?The more things change... the more they stay the same!
Proofpoint
Gigamon
-
ThreatINSIGHT 3.3 Enabling Discovery of Hidden Threats and Rapid InvestigationsA pillar of the Gigamon ThreatINSIGHT™ and Applied Threat Research (ATR) team is to continue to innovate and expand the product’s capacity to dism ...
-
DNS C2 Sandwich: A Novel ApproachThreat actors have been using the domain name system (DNS) for command and control (C2) for years. DNS is a useful channel for malware C2 for many rea ...
-
Silver Linings: How Working from Home Strengthened Our Global WorkforceAs we approach the holiday season and the end of what was arguably the most challenging year of the 21st century, I’ve been reflecting on how much w ...
Trend Micro
- Nothing to display ...
Menlo Security
-
Isolate and Liberate
How Web Isolation Is Setting the Stage for a New, Future-ready Approach to Security.
Imagine you’re an Olympic sprinter. The starting gun is about to go off when race officials announce a late change. You’ll need to hop a zig-zag pattern on one foot while still maintaining your original two-foot qualifying speed—or face a DQ.
-
Increase In Attack: SocGholish
Menlo Labs has uncovered a increase in a drive-by attack that impersonates legitimate browser, Flash, and Microsoft Teams updates
In the last two months, the Menlo Labs team has witnessed a surge in drive-by download attacks that use the “SocGholish” framework to infect victims. This particular framework is known to be widely used to deliver malicious payloads by masquerading as a legitimate software update. Isolation prevents this type of attack from delivering its payload to the endpoint. Here’s what we know.
- 2021 Threat Landscape