Ransomware as a Service: Hacking Made Easy
BrandPost SentinelOne

Ransomware as a Service: Hacking Made Easy

Do you know what the greatest motivator in 2016 was for cyber attacks? If you answered “ransom,” you were correct. Known as the year of ransomware, a whopping 49% of businesses fell victim to cyber ransom attacks. Based on these...

01/31/17

DNC Hack Now Linked to Russian Army Malware
BrandPost SentinelOne

DNC Hack Now Linked to Russian Army Malware

As 2017 continues to bring with it a stream of further revelations detailing Russian government involvement in the hack of the Democratic National Committee, a new facet has emerged. Russian army malware, dubbed “X-Agent,” has...

01/24/17

Threat Intelligence: How To Find The Real Threats In Time
BrandPost SentinelOne

Threat Intelligence: How To Find The Real Threats In Time

Every day we are bombarded by mountains of threat data from a variety of sources. While most of this data is completely irrelevant and needs no attention, we can’t afford to miss the next attack that could be devastating to our...

01/19/17

Are the Adobe Flash Vulnerabilities Leaving You Feeling Scared?
BrandPost SentinelOne

Are the Adobe Flash Vulnerabilities Leaving You Feeling Scared?

Based on an analysis in 2015 of over 100 exploit kits (EKs) and known vulnerabilities, Adobe Flash was the unfortunate winner of the most frequently exploited product. Now that it’s 2017, companies are joking that maybe it’s time...

01/17/17

Cybersecurity Jobs Outlook is Bleak News for Businesses
BrandPost SentinelOne

Cybersecurity Jobs Outlook is Bleak News for Businesses

Here’s a sobering bit of data: there is an employment crisis in information security. By 2019, there will be 6 million job openings for information security professionals—but only 4.5 million security professionals to fill those...

01/12/17

Cybercrime, Not an Act of War
BrandPost SentinelOne

Cybercrime, Not an Act of War

Sometimes, when a network is breached, when servers are compromised, or when unencrypted data is at risk, companies will get, or even seek, assistance from government offices. The nature of cybercrime points to the ways in which...

01/10/17

Three Ways that Security Researchers Trolled Hackers in 2016
BrandPost SentinelOne

Three Ways that Security Researchers Trolled Hackers in 2016

The year 2016 has not really been a standout for information security. This was the year that the Russians hacked the DNC (and now the RNC, apparently), the year that ransomware authors bricked an entire transit system, and the...

01/05/17

Cybercriminals Need Shopping Money for the Holidays, Too!
BrandPost SentinelOne

Cybercriminals Need Shopping Money for the Holidays, Too!

Oh, the ransomware outside is frightful, and the amounts are not delightful… If you’ve been out in the world lately, there’s a chance holiday music is stuck in your head too. You might have noticed that our tune is a little...

01/04/17

Mirai Botnet Descendants Will Lead to Even Bigger Internet Outages
BrandPost SentinelOne

Mirai Botnet Descendants Will Lead to Even Bigger Internet Outages

Hackers iterate constantly and at a frightening rate. Whenever a new piece of malware finds success, a million imitators and successors will pop up. The marketplace of ideas guarantees that the most successful of these variants...

12/22/16

The Market for Mobile Malware Is Heating Up
BrandPost SentinelOne

The Market for Mobile Malware Is Heating Up

Remember when Apple claimed that its products were immune to viruses and malware? This was most prevalent for OS X, but certainly bled into the “walled garden” of iOS. Meanwhile, the open Android operating system has been plagued...

12/20/16

New POS Malware Attacks Are Becoming More Aggressive
BrandPost SentinelOne

New POS Malware Attacks Are Becoming More Aggressive

Professionally written-malware is rarely unsubtle. Long, slow and stealthy attacks are generally the rule—but a rogue malware author has decided to break that rule by going fast and loud. What’s more, this approach is actually...

12/15/16

Insider Threats in Cyber Security—More Than Just Human Error
BrandPost SentinelOne

Insider Threats in Cyber Security—More Than Just Human Error

If you consider the insider threats in cyber security (rather than dismissing everything as human error), you can cover the different types of human error. No matter how you look at it, companies can no longer afford to suffer...

12/13/16

Top Malware Threats for Smart Cities
BrandPost SentinelOne

Top Malware Threats for Smart Cities

While smart cities may be the future, they also create a wide-open target for malware. These technologically dense cities will have a larger attack surface with more internet of things (IoT) devices per square mile. The goal of...

12/08/16

What is Cyber Insurance and Do You Really Need It?
BrandPost SentinelOne

What is Cyber Insurance and Do You Really Need It?

Cyber insurance seems to be a popular new buzzword for many businesses. Roughly 70% of companies are now trying to transfer the risk to a third party insurance company. Out of these, roughly 25% were spending $500,000 or more on...

12/06/16

Expect More IoT Botnet Attacks: Mirai Source Code Now Freely Available
BrandPost SentinelOne

Expect More IoT Botnet Attacks: Mirai Source Code Now Freely Available

The source code for the malware Mirai has been released to the public. This source code, released on Hackforums, can be used to create an Internet of Things botnet that can launch a massive distributed denial of service...

12/01/16

3 Reasons Why Mobile Security Training is Essential
BrandPost SentinelOne

3 Reasons Why Mobile Security Training is Essential

A single, unsecured laptop, smartphone — or these days, even a smartwatch — can be the entry point for immense damage to your company. (Sorry to break it to you). But among all the solutions available, from endpoint security...

11/29/16

The Rise of the Global Internet: A Cacophony of Freedom
BrandPost SentinelOne

The Rise of the Global Internet: A Cacophony of Freedom

One of the most esteemed political figures of the nineteenth century, Alexis de Tocqueville, wrote these words in a time when the American experiment was new: “Nothing is more wonderful than the art of being free, but nothing is...

11/22/16

Look Beyond Next Generation AV
BrandPost SentinelOne

Look Beyond Next Generation AV

If you’ve been actively seeking out a solution to replace legacy antivirus and improve overall endpoint protection, you’ve no doubt gotten a taste of the hype around next generation AV and ‘math-based’ static prevention, which...

11/17/16

Will the Office Thermostat be the Achilles of the Internet of Things (IoT) Security Issues?
BrandPost SentinelOne

Will the Office Thermostat be the Achilles of the Internet of Things (IoT) Security Issues?

September 13, 2016 marked one of the largest attacks the Internet has ever seen. Analysis of the event showed that traffic was approximately 620 Gigabits per second. That volume far exceeds what can knock regular websites...

11/15/16

How Big Data is Improving Cyber Security
BrandPost SentinelOne

How Big Data is Improving Cyber Security

Big data and analytics is showing promise with improving cyber security. 90% of respondents from MeriTalk’s new U.S. government survey said they’ve seen a decline in security breaches. 84% of respondents said they’ve used big data...

11/10/16

Load More