Zephyrnet Logo

Tag: Malware Detection

Qualys Remote Endpoint Protection gets malware detection, free for 60 days

Qualys has added malware detection to its cloud-based Remote Endpoint Protection offer, which is free for 60 days. Any customers currently using the...

Zyxel launches USG FLEX series of mid-range firewalls for small- and medium-sized businesses

As remote working becomes the new normal, businesses face the challenge of keeping their business secure while meeting the needs of a more...

Netwalker Ransomware Tools Reveal Attacker Tactics and Techniques

Malware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective. A malware tool set and related files...

WordPress Security: Setting your Shields to Maximum

In sci-fi flicks, spaceships have shields. To advance the plot, these shields have to be lowered from time to time. This can leave...

Microsoft and Intel project converts malware into images before analyzing it

After assembling the raw pixel stream into a normal-looking 2D image, researchers then resized the resulting photo to a smaller dimension.The Intel...

Google introduces the Chronicle to detect Enterprise level Cyber Threats

Google has introduced the Chronicle to detect enterprise-level cyber threats to businesses that are vying for quick digital detection & response....

Akamai Enhances Enterprise Threat Protector to Add Secure Web Gateway Capabilities

Today, Akamai announced that it has added secure web gateway (SWG) capabilities to its Enterprise Threat Protector (ETP) service to help enterprises...

Malware Analysis Strives To Outpace Enterprise Digitalization

An increase in enterprise phishing threats and malware delivery has boosted demand for malware analysis. Malware analysis is the process by which the purpose...

The winners of the 2020 SC Awards Honored in the U.S.

Trust AwardBest Authentication TechnologyForgeRockForgeRock Identity Platform All journeys have a beginning, middle and an end, and it’s the job of the ForgeRock Identity Platform to...

14 Ways to Evade Botnet Malware Attacks On Your Computers

Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score.Every manner of...

Uh Oh – UEFI rootkit malware spotted in the wild

Reading Time: 3 minutes I remember a little while back, the year was 2011. Those were the last of my consumer Windows tech support...

What is Malware Analysis Techniques

Reading Time: 3 minutesMany of us are dependent on the computers and smart devices to complete our official, personal and household duties. The...

Latest Intelligence

spot_img
spot_img