Which Threats had the Most Impact During the First Half of 2018?

Credit to Author: Trend Micro| Date: Mon, 05 Nov 2018 15:00:50 +0000

One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…

The post Which Threats had the Most Impact During the First Half of 2018? appeared first on .

Read more

Virtualization-based security (VBS) memory enclaves: Data protection through isolation

Credit to Author: Windows Defender ATP| Date: Tue, 05 Jun 2018 16:00:15 +0000

The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote code execution capability, resulting in widescale global outbreaks. Windows 10 remained resilient to these attacks,

Read more

Read more