latest insights

seculert blog

Unsplashed background img 1

Network Breached? Ask Yourself these 3 Questions within the First 48 Hours

In an article for Bankingtech.com, Peter Cheney, the director of cybersecurity at independent global risk and strategic consulting firm Control Risks, has identified three essential questions that he believes enterprises must ask within the first 48 hours after a network breach:

read more

Cybersecurity’s Weakest Link? Employees

About 15 years ago, a game show took public humiliation to new heights (or depths, depending on one’s perspective) by branding unsuccessful contestants as the weakest link in the group. They were then ushered offstage to the tune of the most soul-crushing “goodbye” in television history by the host.

read more

Cyber Attacks Beating 54% of Organizations Says Survey

A survey of 500 IT decision-makers in UK enterprises (250+ employees) has revealed that 54% lack the knowledge and capacity required to thwart sophisticated cyber attacks.

read more

Malware Slips by Prevention-Based Security Software

An automated and independent malware testing service has taken a quick break from analyzing malware such as worms, information stealers, and rootkits so that it can crunch some numbers — and the news isn’t good for enterprises that rely exclusively on prevention-based security software packages.

read more

On-Demand Webinar: Proxy Games - How Enterprises Remain Vulnerable to Threats

Today's enterprises still remain vulnerable to threats, in particular those companies relying on prevention-based perimeter...

read more

Proxy Games - How Enterprises Remain Vulnerable to Threats

On-Demand Webinar

read more

New Dyre variant outsmarts AV researchers' sandboxes

Now Seculert researchers have discovered new changes that make Dyre more difficult to detect and analyze.

read more

Anti-sandbox capabilities found in Dyre malware

Seculert research discovers that a new version of the financial malware Dyre is avoiding sandbox detection by counting the number of cores.

read more

Banking Trojan Uses Simple Method to Evade White Hats’ Analysis

A new variant of Dyre banking Trojan has emerged with a simple, yet efficient trick that prevents malware researchers from analyzing it.

read more

Nasty Dyre malware bests white hat sandboxes

Core checker a defensive wrecker

read more

Subscribe to Email Updates

Contact Us

Unsplashed background img 2