latest insights

seculert blog

Unsplashed background img 1

Seculert Delivers Advanced Threat Protection as a Cloud-based Solution

Two months since the news of the massive Target breach broke, reports are starting to reveal bits and pieces of how the perpetrators were able to get a foothold inside Target’s point of sale system

read more

Fresh Target Breach Cards Hitting Black Market

A Bitcoin-powered marketplace is selling stolen card data in small batches, offering card validity guarantees, an RSA presentation reveals.

read more

Neiman Marcus Hackers Set Off 60,000 Alerts While Bagging Credit Card Data

The hackers who raided the credit-card payment system of Neiman Marcus Group set off alerts on the company’s security systems about 60,000 times as they slunk through the network, according to an internal company investigation.

read more

Exclusive: France's Snecma targeted by hackers - researcher

French aerospace engine maker Snecma, a unit of Safran, was attacked by hackers who exploited a vulnerability in Microsoft Corp's Internet Explorer, according to a computer security researcher.

read more

New zero-day bug in IE 10 exploited in active malware attack, MS warns

Exploit hosted on hacked, US-based website commandeers visitors' PCs.

read more

Look to Israel for new cybersecurity ideas, innovation, partnerships and inspiration

But the most memorable parts of CyberTech 2014 were the multiple visits to the start-up pavilion, which included new cybersecurity companies that are challenging the status quo.

read more

Israeli defense computer hacked via tainted email: cyber firm

Hackers broke into an Israeli defense ministry computer via an email attachment tainted with malicious software that looked like it had been sent by the country's Shin Bet secret security service, an Israeli cyber security firm said on Sunday.

read more

A closer look at the Target malware, Part II

Yesterday’s story about the point-of-sale malware used in the Target attack has prompted a flood of analysis and reporting from antivirus and security vendors about related malware.

read more

A sneaky path into Target customers’ wallets

It was, in essence, a cybercriminal’s dream. For months, an amorphous group of Eastern European hackers had been poking around the networks of major American retailers, searching for loose portals that would take them deep into corporate systems.

read more

Cloud-Based Sandboxing: An Elevated Approach to Network Security

While the concept of sandboxing isn’t new, it wasn’t until a few years ago that it entered the mainstream network security vocabulary and enterprises began using on-premises sandboxing appliances to test suspicious executables for malware.

read more

Subscribe to Email Updates

Contact Us

Unsplashed background img 2