twitterfacebook

Blog

April 11, 2019

PDF Files at Risk! Chrome Zero - Day Malware Steals Personal Data Through PDFs

Downloading files from the Internet has always been a risky business – and PDF files are no exception. EdgeSpot, an exploit detection service, has identified a new range of 
Read More
March 27, 2019

Detection or prevention based solutions for cyber threats? A search for the winning strategy.

With the average data breach costing $3.86 million[2], no organization wants to take security risks. As hackers continuously develop new types of malware, organizations must be on top of their game – ensuring that their cybersecurity strategy provides full coverage against all types of threats, including zero-day or unknown threats....
Read More
March 27, 2019

Facing the unknown: zero-day threats

Zero-day malware presents a huge cybersecurity challenge for organizations. These threats are undiscovered – targeting weaknesses that developers haven’t yet found. So, by nature, zero-day threats don’t have a signature – they are ‘unknown’ threats –  and won’t be found in any existing database – rendering traditional, detection-based security solutions...
Read More
March 10, 2019

Votiro Disarmer 8.3 Is Here! All You Need to Know About Our Latest Update

Here at Votiro, we’re pleased to announce the launch of our latest update – Disarmer Version 8.3. This update brings some new and exciting features to our award-winning CDR solution, protecting you from known and unknown threats better than ever before. Designed with our users in mind, this update focuses...
Read More
March 06, 2019

CVE-2017-11882 Investigation

A nasty vulnerability that utilizes a Microsoft Office file to execute malicious commands and hurt your system and your company is causing a lot of dammage. In order for this vulnerability to be exploited, a user is required to open a file that was specially crafted to include an affected...
Read More
February 06, 2019

Do you Have Protection from the latest Ursnif and GandCrab campaigns? We Do.

Protecting your organization against cyber-crime means being ready for the unknown at all times. This week, researchers have uncovered two new malware campaigns that attack your infrastructure through something as innocent as a MS Word file. Both of the attacks use the Ursnif trojan that is known for stealing data,...
Read More
February 05, 2019

Zero Day May Be Too Late. Do you have Zero Second Protection?

Once an infected file enters your network, the timer begins. From one breached machine, attackers can make lateral moves around your IT environment, moving to access critical infrastructure or assets such as customer databases. They can also escalate privileges by stealing user credentials to gain more and more control and...
Read More
January 03, 2019

When You Don’t Know What You’re Looking For, You Need Security That Doesn’t Care. Understanding CDR as an Alternative to Antivirus

As cyberthreats grow in both impact and reach year on year, the problems with traditional antivirus solutions are only becoming clearer. Many antivirus providers are continually adding improvements and functionality to their antivirus services, adding protection against new known threats that they hope will close the gaps and better protect...
Read More
December 27, 2018

How Hackers Will Think in 2019: Low Hanging Fruit and Sophistication in Future Cyber Attacks

As CISOs and other security professionals prepare to slam the door on 2018, the question, unfortunately, must be asked: what does 2019 likely have in store for organizations when it comes to cyberattacks? Trend #1: a rise in ‘cryptojacking’ and the infection of crypto-miners Sometimes called “cryptojacking,” we unfortunately predict a continued rise in infection rates of...
Read More
December 17, 2018

2018: The Four zero day attack stats and trends you need to know

There was a time when the organizations that got rocked by a zero day attack garnered great amounts of sympathy. After all, how could an organization be expected to deal with the rare occurrence of an unknown threat? That time has come, and it has very much gone, however.
Read More