cybersecurity

ScadaICSSchneider

Experience the Innovation Summit in Chicago with EcoStruxure on Display

Credit to Author: Carlos Villa| Date: Wed, 11 Apr 2018 20:31:00 +0000

Last month, we hosted our first Innovation Summit: Industry event in Chicago featuring expert speakers sharing insights on Industry 4.0 / IIoT, cyber security, and the value of connected products… Read more »

The post Experience the Innovation Summit in Chicago with EcoStruxure on Display appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

Hunting down Dofoil with Windows Defender ATP

Credit to Author: Windows Defender ATP| Date: Wed, 04 Apr 2018 15:00:18 +0000

Dofoil is a sophisticated threat that attempted to install coin miner malware on hundreds of thousands of computers in March, 2018. In previous blog posts we detailed how behavior monitoring and machine learning in Windows Defender AV protected customers from a massive Dofoil outbreak that we traced back to a software update poisoning campaign several

Read more

Read More
ScadaICSSchneider

IEC 62443 Security Assurance Levels Explained

Credit to Author: Daniel Desruisseaux| Date: Fri, 30 Mar 2018 19:16:02 +0000

Industrial Control Systems have experienced an exponential increase in cyber-attacks over the last decade.  The industry has responded to cybersecurity threats by creating standards to assist end users and equipment… Read more »

The post IEC 62443 Security Assurance Levels Explained appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

Why Windows Defender Antivirus is the most deployed in the enterprise

Credit to Author: Windows Defender ATP| Date: Thu, 22 Mar 2018 16:58:23 +0000

Statistics about the success and sophistication of malware can be daunting. The following figure is no different: Approximately 96% of all malware is polymorphic meaning that it is only experienced by a single user and device before it is replaced with yet another malware variant. This is because in most cases malware is caught

Read more

Read More
MicrosoftSecurity

Sharing research and discoveries at PWN2OWN

Credit to Author: Windows Defender Research| Date: Wed, 14 Mar 2018 23:58:49 +0000

The annual PWN2OWN exploit contest at the CanSecWest conference in Vancouver, British Columbia, Canada, brings together some of the top security talent from across the globe in a friendly competition. For the participants, these events are a platform to demonstrate world-class skills and vie for significant cash prizes. For companies like Microsoft, where we have

Read more

Read More
MicrosoftSecurity

Poisoned peer-to-peer app kicked off Dofoil coin miner outbreak

Credit to Author: Windows Defender Research| Date: Tue, 13 Mar 2018 22:27:06 +0000

On March 7, we reported that a massive Dofoil campaign attempted to install malicious cryptocurrency miners on hundreds of thousands of computers. Windows Defender Antivirus, with its behavior monitoring, machine learning technologies, and layered approach to security detected and blocked the attack within milliseconds.Windows 10 S, a special configuration of Windows 10 providing Microsoft-verified security,

Read more

Read More
MicrosoftSecurity

Invisible resource thieves: The increasing threat of cryptocurrency miners

Credit to Author: Windows Defender ATP| Date: Tue, 13 Mar 2018 12:57:36 +0000

The surge in Bitcoin prices has driven widescale interest in cryptocurrencies. While the future of digital currencies is uncertain, they are shaking up the cybersecurity landscape as they continue to influence the intent and nature of attacks. Cybercriminals gave cryptocurrencies a bad name when ransomware started instructing victims to pay ransom in the form of

Read more

Read More