Startup Cyber adAPT takes on threat detection
Cyber adAPT, a startup springing from DARPA funded research, is shipping its first products that detect network compromises and gather data that can be used later for forensic analysis of breaches.
Cyber adAPT, a startup springing from DARPA funded research, is shipping its first products that detect network compromises and gather data that can be used later for forensic analysis of breaches.
Vectra Networks is rolling out a new appliance that gives its attack-detection gear better visibility into potentially malicious activity on corporate networks.
ForeScout has named a new CEO who has big plans for making the company's products the remediation layer of choice for other vendors' security offerings that find problems with endpoints but can't fix them.
The number of computers in North America infected by the Backoff malware, which is blamed for a string of payment card breaches, has risen sharply, according to research from network security company Damballa.
Attackers launch malware that automatically alters itself to avoid detection, and they constantly create new domains where their command-and-control servers can hide, but researchers have come up with security software that detects the presence of attack code even if it has morphed and tracks down domains that infected client machines report to.
Hackers have found a devious new way to disseminate malware: They're using peer-to-peer networks.
The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa.
The first three months of 2013 have seen a surge in spam volume, as well as large numbers of samples of the Koobface social networking worm and master boot record (MBR) infecting malware, according to antivirus vendor McAfee.
Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts.
A dangerous piece of malicious code responsible for stealing money from online bank accounts is being updated with new functions after its source code was leaked earlier this year, according to security researchers.
Contrary to general perception, the recent cyberattacks against Google and more than 30 other high-tech companies were carried out by relatively unsophisticated attackers using outdated botnet tools, according to Damballa, an Atlanta-based security firm.