article thumbnail

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance

CTOvision

February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. ABOUT SYMANTEC. Ninety-nine percent of Fortune 500 companies are Symantec customers. Santa Clara, Calif.,

Symantec 150
article thumbnail

How Cybersecurity is Changing in the Post-Pandemic Era

CIO Business Intelligence

Traditionally, attackers would just drop their malware on the endpoint and run it. Recently, we came across a case where the attackers had installed a virtual box onto the endpoint and then downloaded a disk image. When the virtual machine started, the malware was loaded only inside of the virtual machine.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

The browser isolation technique considers non-whitelisted websites unreliable and isolates them from the local machine in a virtual environment. Cyberattacks such as malware infiltration and vulnerability exploitation continue to make headlines, attacking companies of various sizes. Local browser isolation is the traditional method.

article thumbnail

Invincea Names Former Verizon Terremark CISO as Chief Operating Officer

CTOvision

the market leader in the use of secure virtual containers for user protection against advanced cybersecurity threats, today announced the appointment of Norm Laudermilch as the company’s first chief operating officer. Invincea is the premier innovator in advanced malware threat detection, breach prevention and forensic threat intelligence.

Symantec 266
article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

Although software like hypervisors can create and manage separate virtual environments, it's important that cloud providers ensure some level of compartmentalization so user data or applications aren't compromised by malicious software. Access Control. Modern cloud landscapes face inevitably more sophisticated attacks.

Cloud 150
article thumbnail

Top 10 Most-Destructive Computer Viruses

Galido

Computer viruses have come a long way from the early days of personal computers, when teenage hackers competed for bragging rights, creating malware designed for mischief or random mayhem. As the stakes have grown, so too has the potential damage and destruction brought on by malware. Cyber Command. military strategy.

Malware 60
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. And how might we defend ourselves? When they did that.

System 52