dcsimg

A week in security (June 17 – 23)

Last week on the Malwarebytes Labs blog, we took a look at the growing pains of smart cities, took a deep dive into AI, jammed along to Radiohead, and looked at the lessons learned from Chernobyl in relation to critical infrastructure. We also explored a new Steam phish attack, and pulled apart a Mac cryptominer. Other cybersecurity news Florida City falls to ransomware: Riviera Beach City … [Read more...]

Mobile stalkerware: a long history of detection

Recently, we have received an alarming question from many Malwarebytes users, asking, “Do you detect stalkerware?” The answer is an overwhelming, “Absolutely, and for good reason!” Moreover, we have been doing so for a long time, and are expanding our efforts in the months to come. Going back more than five years, Malwarebytes researchers have detected applications and software that monitor … [Read more...]

Perimeter 81 Recognized in Gartner’s 2019 Market Guide for Zero Trust Network Access

Reading Time: 3 minutesPerimeter 81, a secure network access solution for the modern and distributed workforce has been included in the April 2019 Market Guide for Zero Trust Network Access by Gartner Inc., a leading IT research and advisory company. At Perimeter 81, our Software-Defined Perimeter (SDP) service, backed by Zero Trust access control, ensures secure access to … The post … [Read more...]

Urgent: Patch Now to Prevent a BlueKeep Attack

On June 4, the United States National Security Agency (NSA) released … [Read more...]

Media Alert: Tenable Named a ‘Top DC Workplace’ by The Washington Post

Tenable®, Inc., the Cyber Exposure company, today announced that it has been recognized by The Washington Post as a 2019 Top DC Workplace based on ratings from Tenable employees. Tenable was ranked in the top five among large companies on the list. … [Read more...]

From pandemonium to fines – a review of GDPR enforcement in Europe

Do you remember the Y2K bug in the run-up to the new millennium? Warnings that computer systems and networks would stop functioning on 1 January 2000 led to panic and pandemonium as people prepared for its impact.   In some ways, the introduction of the GDPR (General Data Protection Regulation) was reminiscent of the Y2K scare.  Despite the two-year transition period, a lot of organisations left … [Read more...]

10 Tips to Help Keep Office 365 Secure Against Breaches

It can often seem like a company experiences a data breach every day. Now, even though your business may not be the largest around, it is still important to protect your clients’ privacy. If you use the Office 365 system, here are all the ways you can do so: 1. Create Greater Security Awareness Although most companies fail to realize it, your employees can often be your weakest link. Since … … [Read more...]

Pride at Tenable

Hi, my name is Mark Lloyd and I run the University Recruiting Program here at Tenable. I’m also gay. Being able to make this statement in a public forum, much less at my place of employment, is something that wouldn’t have been feasible for me 10 years ago. So, when people asked me what my experience working at Tenable is like being part of the LGBTQ+ community, it prompted me to take stock of … [Read more...]

Detecting and Defending Against Pass the Hash Attacks

A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look. … [Read more...]