Malware outbreaks have several characteristics: First, the vulnerabilities that are being used are 0-day or n-day exploits on commonly used software. The widespread use of these commonly used software means there are lots of potential targets. Because not everyone may patch their software in a timely manner, there are many unpatched systems on the network….
by
In the morning of May 12th, a global outbreak of a large-scale extortion software incident made headlines, impacting a total of 99 countries, and at least 75,000 Windows computer systems. It affected Education, Medical and other critical institutions, and is continuing to spread rapidly. Background The ransomware is a new type called “WanaCrypt0r 2.0” and…

2017 Security Trends

Enterprise Security In enterprise security investment, more emphasis has been put on post breach detection and incident response for this passing year. We will see this trend continue in 2017. Technologies in the area of breach detection, data leak protection, remediation, and so forth, are focusing on the full cyber kill chain rather than an…
The Characteristics of the Locky Ransomware Locky is a ransomware that is usually contained within a Microsoft Word document sent by email as an attachment – often as an invoice – to large numbers of recipients using a massive spam campaign. Locky has spread rapidly since its first appearance and has infected thousands of computers…
What is a web crawler? A web crawler (also called web spider, web robot) is typically a script or computer program that browses the targeted website in an orderly and automated manner. It is an important method for collecting information on the Internet and is a critical component of search engine technology. Most popular search…