Encrypted internet traffic is on an explosive upturn. According to the Google® Transparency Report: “Users load more than half of the pages they view over HTTPS and spend two-thirds of their time on HTTPS pages.”[1] At the same time, encrypted traffic carried nearly 3.5 million unique malware samples in 2017. …
Read More »Machine Learning: Your Unfair Advantage Against Attackers
In the never-ending arms race between threat actors and defenders, automation and machine learning have become your ultimate weapons. Today, threat actors employ automation in countless ways to speed up their attacks and evade detection. Outpacing attackers requires the effective use of automation and machine learning. Years ago, our research …
Read More »Catching bad guys
Ever wondered how the good guys catch bad guys? I meant to say, what’s the process of catching bad guys who create virus, malware, crypto-lockers? It’s sort of a grey area and mostly not discussed very openly about the different methodologies used for Catching bad guys who create and distribute …
Read More »Regin Malware: Top-tier espionage tool enables stealthy surveillance
I don’t usually reblog or post others post in here. But this is something EVERYONE should be aware of. An advanced piece of malware, known as Regin Malware, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, …
Read More »