Thinking Outside of the Rack: Designing and Planning by Pod

Credit to Author: Patrick Donovan| Date: Wed, 28 Jun 2017 17:42:17 +0000

In olden times, the supporting infrastructure for data centers and IT rooms would be built out all at once…based on some vague understanding (guess?) of what future IT needs would… Read more »

The post Thinking Outside of the Rack: Designing and Planning by Pod appeared first on Schneider Electric Blog.

Read more

The Law of Unintended Outbreak – Who Is at Risk from Petya?

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Wed, 28 Jun 2017 16:01:32 +0000

Cyber crime can impact individual users and businesses anywhere in the world.Hot on the heels of the global WannaCry outbreak in May, yesterday saw a wave of what looked like copycat malware sweeping the globe again. However, on closer inspection there may more to this than meets the eye, more than a simple new variant of an already established ransomware borrowing propagation techniques from WannaCry. The…

Read more

In-Depth Analysis of .NET Malware JavaUpdtr

Credit to Author: Xiaopeng Zhang| Date: Wed, 28 Jun 2017 16:15:52 +0000

FortiGuard Labs recently captured some malware which was developed with the Microsoft .Net framework. I analyzed one of them, and in this blog, I’m going to show you how it is able to steal information from a victim’s machine. The malware was spread via a Microsoft Word document that contained an auto-executable malicious VBA Macro. Figure 1 below shows how it looks when it’s opened. Figure 1. When the malicious Word document is opened What the VBA code does Once you click the “Enable Content”…

Read more

Solution Corner: Malwarebytes Endpoint Protection

Credit to Author: Ken Liao| Date: Wed, 28 Jun 2017 15:00:28 +0000

Introducing Malwarebytes Endpoint Protection, our latest endpoint security solution for business. This latest release unifies a number of technologies onto a single agent on the endpoint and adds a new machine learning detection engine into our layered approach to protection.

Categories:

Tags:

(Read more…)

The post Solution Corner: Malwarebytes Endpoint Protection appeared first on Malwarebytes Labs.

Read more

Adware the series, part 6

Credit to Author: Pieter Arntz| Date: Wed, 28 Jun 2017 15:00:13 +0000

In this part of the series, we are going to have a look at types of adware that are very hard to find and remove, like ADS, rootkits, and file-less infections.

Categories:

Tags:

(Read more…)

The post Adware the series, part 6 appeared first on Malwarebytes Labs.

Read more

Fortinet UTM: A Gartner’s Magic Quadrant Leader 8 Times in a Row

Credit to Author: John Maddison| Date: Wed, 28 Jun 2017 12:55:00 +0000

Fortinet’s UTM solutions have been positioned in the leader’s quadrant of Gartner’s annual Magic Quadrant for Unified Threat Management report for the 8th year in a row. In this year’s report, Gartner recognized the ‘completeness’ of our solution, which includes the Security Fabric vision, and we also achieved the highest placement for our ability to execute on that vision. Unified Threat Management, or UTM, solutions consolidate security and networking functions into a single device to simplify business infrastructures…

Read more