latest insights

seculert blog

Unsplashed background img 1

Top 100+ Cyber Security Blogs By Page Rank

Welcome to the Top 100+ Cyber Security Blogs. This list will continue to be updated and refined. I will be adding new metrics and ranking factors in the future that will help give a better overall ranking.

read more

Protecting Against Advanced Persistent Threats: Choosing A Security Solution

Advanced Persistent Threats (APTs) are a growing danger to all organizations. Unlike legacy malware, which operate opportunistically, APTs can persist undetected on a network for over a year, while the perpetuators behind them manipulate and steal valuable data and carry out their devious economic, political and social agendas.

read more

On-demand - Why depending on malware prevention alone is no longer an option

Learn how to protect your network from APTs. Register to on-demand webinar.

read more

Seculert v2.0: New look, new features, new technology

PETACH-TIKVA, ISRAEL — Seculert, the cloud-based advanced threat protection solution, announced today the release of a new version of their service. The new version features the general availability of their Elastic Sandbox technology (previously in Beta), an updated application programming interface (API), and a stunning new user interface. This new release comes just before Seculert’s scheduled appearance at Black Hat USA 2013.

read more

Seculert partners with Sequoia Capital, raises $10M in Series B financing

PETACH-TIKVA, ISRAEL - Seculert, the cloud-based advanced threat protection company, announced today the closing of a $10 million Series B funding partnership with Sequoia Capital with participation from existing investor, Norwest Venture Partners (NVP). Gili Raanan, partner at Sequoia Capital, has joined Seculert’s Board of Directors along with existing investor Dror Nahumi of NVP, founding investor Yoav Andrew Leitersdorf of YL Ventures and industry veteran Benny Schnaider.

read more

Seculert Uncovers Magic Malware

Seculert researchers recently came across a malware sample they're calling "Magic," which had remained undetected on targeted machines for 11 months.

read more

'Magic' Malware Uses Custom Protocol And A 'Magic Code' Handshake

read more

'Time Bomb' Attack Out Of China Defused

read more

Malware linked to Chinese hackers aims at Japanese government

read more

Phishing emails use fake Mandiant China spy report bait to target victims

read more

Subscribe to Email Updates

Contact Us

Unsplashed background img 2