{"id":16683,"date":"2019-10-24T10:52:19","date_gmt":"2019-10-24T18:52:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/24\/news-10422\/"},"modified":"2019-10-24T10:52:19","modified_gmt":"2019-10-24T18:52:19","slug":"news-10422","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/24\/news-10422\/","title":{"rendered":"VB tests the web security products that play an important role in fending off web-based threats"},"content":{"rendered":"<p>The web continues to be a major infection vector for individuals and organisations alike. Though the number of drive-by download attacks (often through exploit kits) is down from its peak half a decade ago, they have seen a bit of resurgence recently, with more than half a dozen exploit kits currently active \u2500 and tracked in the <em>Virus Bulletin<\/em> lab.<\/p>\n<p>At the same time, links in emails are often use to spread malware, thus combining these two most common infection vectors. In our email security tests we have repeatedly shown that emails with a malicious link are less likely to be blocked than those with a malicious attachment, and indeed many active malware campaigns spread this way.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"framed\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/b83f8d37339681b23fbab79191030fdd_f3776.png\" alt=\"radioek_nemtyransomware.png\" width=\"800\" height=\"490\" \/><span class=\"centered-caption\">The Nemty ransomware as downloaded by the Radio exploit kit.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>And not all bad URLs contain malware: the market for stolen credentials continues to make phishing for credentials an easy way for criminals to make money\u00a0\u2013 indeed, we see a great many phishing URLs active every day.<\/p>\n<p>Though good security against web-based threats involves a multi-layered approach that includes endpoint security, regular patching and multi-factor authentication, web security products can prevent the user from accessing malicious URLs in the first place.<\/p>\n<p>In our <a title=\"VBWeb\" href=\"https:\/\/www.virusbulletin.com\/testing\/vbweb\/\">VBWeb tests<\/a>, we have been testing many web security products for their ability to block such threats. Like all of <em>VB<\/em>&#8216;s tests, we can test products either privately or publicly, and like all <em>VB<\/em> tests the test combines certification with performance measurement in various categories. The <a title=\"VBWeb Test Archive\" href=\"https:\/\/www.virusbulletin.com\/testing\/vbweb\/vbweb-test-archive\/\">quarterly reports<\/a> (most recently <a title=\"VBWeb Comparative Review - Autumn 2019\" href=\"https:\/\/www.virusbulletin.com\/virusbulletin\/2019\/10\/vbweb-comparative-review\/\">Autumn 2019<\/a>) also provide a good overview of the web threat landscape.<\/p>\n<p>In our test lab, we can test both cloud-based and on-premise solutions, and also look at the performance of URL- or domain-based blocklists. We are currently working on the integration of endpoint-based security products.<\/p>\n<p>If you are interested in having your product tested, or discussing the options with us, do contact us at <a href=\"https:\/\/www.virusbulletin.commailto:vbtest@virusbulletin.com\">vbtest@virusbulletin.com<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/5914\/5553\/0570\/vbweb-verified.jpg\" alt=\"vbweb-verified.jpg\" width=\"130\" height=\"195\" \/><\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/10\/vb-tests-web-security-products-play-important-role-fending-web-based-threats\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/b83f8d37339681b23fbab79191030fdd_f3776.png\"\/><br \/>                                 The web continues to be a major infection vector for malware and credential-stealing threats. In the VBWeb tests, we measure products&#8217; ability to block such threats and certify products that perform a good job at doing so.                <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/10\/vb-tests-web-security-products-play-important-role-fending-web-based-threats\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-16683","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16683"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16683\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16683"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}