Remove Blog Remove Malware Remove Network Remove SMB
article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. Background. Description.

Malware 75
article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . To get all the details, read the blog “ Are You Ready for the Next Log4Shell? 3 - Attackers boost use of infostealer malware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

WannaCry Ransomware Review and Global Impact.

ProtectWise

The purpose of this blog post is to regroup on many conflicting statements on the ransomware and to summarize coverage from our perspective at ProtectWise. WannaCry's primary infection vector is through publicly accessible hosts running an unpatched version of Windows via the SMB protocol. What Networks are Vulnerable?

article thumbnail

We're Honored to Be Recognized Again! A Leader 11 Straight Times

Palo Alto Networks

On December 22, 2022, Gartner named Palo Alto Networks a Leader for the eleventh consecutive time in its Gartner® Magic Quadrant™ for Network Firewalls for 2022. Read The Total Economic Impact™ of Palo Alto Networks for Network Security to learn how you can maximize your ROI with our network security platform.

article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

On March 17, our webinar “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” webinar will share tips on using Cortex XDR to discover network threats. These analysts are called Unit 42: the global threat intelligence team at Palo Alto Networks that is renowned for their work to hunt, catch and tag threats.

article thumbnail

Examining the Treat Landscape

Tenable

This blog post will explore tactics and vulnerabilities leveraged by attackers and how they compare to the treats of the season. Attackers have a cornucopia of options from which to choose to gain that first step into target networks. Specifically, CISA has warned of the TrickBot malware and BlackMatter ransomware abusing SMB.

SMB 98
article thumbnail

The odd case of a Gh0stRAT variant

AlienVault

As 2018 drew to a close and 2019 took over, I began to see a different behavior from SMB malware authors. Some key functionality is below: Can download more malware. Malware Analysis. Stage1 - Typically the first contact or entry point for malware. This is the first part of the malware to arrive on a system.

SMB 40