Read the original article: VMware Carbon Black Delivers High-Fidelity Insight at Every Step of MITRE Engenuity ATT&CK® Evaluation For the third year in a row, VMware Carbon Black today announced its participation in MITRE Engenuity’s third annual ATT&CK® Evaluations with…
Category: VMware Carbon Black
VMware Carbon Black Delivers High-Fidelity Insight at Every Step of MITRE Engenuity ATT&CK® Evaluation
Read the original article: VMware Carbon Black Delivers High-Fidelity Insight at Every Step of MITRE Engenuity ATT&CK® Evaluation For the third year in a row, VMware Carbon Black today announced its participation in MITRE Engenuity’s third annual ATT&CK® Evaluations with…
COVID-19 and HIPAA Enforcement Discretion Leaves Healthcare Organizations Vulnerable to Ransomware Attacks
Read the original article: COVID-19 and HIPAA Enforcement Discretion Leaves Healthcare Organizations Vulnerable to Ransomware Attacks Patient engagement is a term that has been discussed in healthcare for years. But now, it’s an urgent priority as providers work to vaccinate…
Linux Distribution Coverage Extended Across the VMware Carbon Black Cloud
Read the original article: Linux Distribution Coverage Extended Across the VMware Carbon Black Cloud In 2020, a record 56 new Linux malware families were discovered. We are now seeing this trend continue into the new year with the latest discovery…
Women in Security Part 6: Meet Nandini De, Director of Engineering
Read the original article: Women in Security Part 6: Meet Nandini De, Director of Engineering This post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack To conclude Women’s History Month, we…
Women in Security Part 5: Meet Lavine Oluoch, Threat Analyst
Read the original article: Women in Security Part 5: Meet Lavine Oluoch, Threat Analyst This post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack In continued celebration of Women’s History Month,…
Women in Security Part 5: Meet Lavine Oluoch, Threat Analyst
Read the original article: Women in Security Part 5: Meet Lavine Oluoch, Threat Analyst This post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack In continued celebration of Women’s History Month,…
Women in Security Part 4: Meet Jan Lawford, Senior Director of EMEA Security Sales
Read the original article: Women in Security Part 4: Meet Jan Lawford, Senior Director of EMEA Security Sales This post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack As we continue…
VMware Carbon Black Ranks Among Top 10 of 100 Cybersecurity Companies by the University of San Diego
Read the original article: VMware Carbon Black Ranks Among Top 10 of 100 Cybersecurity Companies by the University of San Diego We are proud to announce that VMware Carbon Black has been ranked within the top 10 organizations on the…
Fighting Back in 2021: 4 Best Practices for Security Teams
Read the original article: Fighting Back in 2021: 4 Best Practices for Security Teams “Attacks these days don’t have a natural beginning or ending. For an adversary, every attack is an opportunity to learn something that can then be used…
Women in Security Part 3: Meet Marina Liang, Threat Researcher
Read the original article: Women in Security Part 3: Meet Marina Liang, Threat Researcher This post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack In celebration of Women’s History Month, we’re…
Securing Containers and Kubernetes-Orchestrated Environments
Read the original article: Securing Containers and Kubernetes-Orchestrated Environments In a recent Black Hat webcast, “Securing Containers and Kubernetes-Orchestrated Environments,” sponsored by VMware Carbon Black, guest speakers Sheila A. Berta, Offensive Security Specialist, Dreamlab Technologies and Haim Helman, CTO, VMware…
Women in Security Part 2: Meet Suzanne Hall, Global CISO and VP, Technology at Circle K Stores
Read the original article: Women in Security Part 2: Meet Suzanne Hall, Global CISO and VP, Technology at Circle K Stores This post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack …
2021 Cybersecurity Outlook: Attackers vs. Defenders
Read the original article: 2021 Cybersecurity Outlook: Attackers vs. Defenders COVID-19, One Year Later 2020 was undoubtedly a defining year for cybersecurity – a year that ended with the SolarWinds breach, which infiltrated US government agencies and organizations at a…
2021 Cybersecurity Outlook: Attackers vs. Defenders
Read the original article: 2021 Cybersecurity Outlook: Attackers vs. Defenders COVID-19, One Year Later 2020 was undoubtedly a defining year for cybersecurity – a year that ended with the SolarWinds breach, which infiltrated US government agencies and organizations at a…
TAU Threat Advisory: Microsoft Exchange Servers Targeted with Four Zero-day Exploits
Read the original article: TAU Threat Advisory: Microsoft Exchange Servers Targeted with Four Zero-day Exploits The following advisory from VMware Threat Analysis Unit (TAU) is to provide guidance, best practices and capabilities to identify risk, prevent, detect and respond to…
Women in Security Part 1: Meet Taree Reardon, Senior Threat Analyst
Read the original article: Women in Security Part 1: Meet Taree Reardon, Senior Threat Analyst This post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack In celebration of International Women’s Day,…
Women in Security: Celebrating Women’s History Month
Read the original article: Women in Security: Celebrating Women’s History Month In celebration of Women’s History Month, we are honoring all of the women at VMware who inspire, lead, innovate and set the stage for the next generation to come.…
VMware Carbon Black Named to the 2021 CRN Security 100 List
Read the original article: VMware Carbon Black Named to the 2021 CRN Security 100 List We are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black to its annual Security 100 list. The…
VMware Carbon Black Named to the 2021 CRN Security 100 List
Read the original article: VMware Carbon Black Named to the 2021 CRN Security 100 List We are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black to its annual Security 100 list. The…
The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber Threats
Read the original article: The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber Threats On the frontline of the pandemic, perhaps no industry was impacted and forced to innovate and transform as quickly as healthcare in…
The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber Threats
Read the original article: The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber Threats On the frontline of the pandemic, perhaps no industry was impacted and forced to innovate and transform as quickly as healthcare in…
Deploying The New VMware Carbon Black Container Security Solution
Read the original article: Deploying The New VMware Carbon Black Container Security Solution “VMware acquired Octarine, a privately held company in Sunnyvale, California on May 27, 2020. Octarine offers a cloud-native security platform for the complete lifecycle of applications running…
VMware Carbon Black Champions Data Privacy Day 2021
Read the original article: VMware Carbon Black Champions Data Privacy Day 2021 Today is Data Privacy Day, an annual effort hosted by the National Cybersecurity Alliance (NCSA) to raise awareness about the importance of privacy and protection of personal information.…
VMware Carbon Black Cloud™ Awarded Cyber Catalyst Designation
Read the original article: VMware Carbon Black Cloud™ Awarded Cyber Catalyst Designation VMware Carbon Black Cloud has been awarded a Cyber CatalystSM designation for its cloud native endpoint and workload protection platforms, which helps more than 20,000 organizations worldwide detect…
Bridge the Gap between Security and IT in Cloud Workload Protection
Read the original article: Bridge the Gap between Security and IT in Cloud Workload Protection It often feels as though Security and IT are trying to build the same house from different blueprints. Security works tirelessly to stay ahead of…
Enterprise EDR Expands New Linux Coverage to SUSE, OpenSUSE, Ubuntu, Oracle & Amazon Linux
Read the original article: Enterprise EDR Expands New Linux Coverage to SUSE, OpenSUSE, Ubuntu, Oracle & Amazon Linux VMware Carbon Black is pleased to announce an exciting expansion of Linux distribution coverage for Enterprise EDR users on the VMware Carbon…
Announcing the General Availability of Container Security in the VMware Carbon Black Cloud
Read the original article: Announcing the General Availability of Container Security in the VMware Carbon Black Cloud Today, we are excited to announce the first release of Container Security capabilities in the Carbon Black Cloud. Building on our Cloud Workload…
TAU Threat Analysis: Insights on the SolarWinds Breach
Read the original article: TAU Threat Analysis: Insights on the SolarWinds Breach The SolarWinds breach is proving to be one of the most significant breaches in the last few years – in its sophistication and impact. In an alert, CISA…
Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 Highlights
Read the original article: Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 Highlights In episode 16 of “Ask the Howlers,” host Stacia Tympanick, senior solution engineer, met up with Ryan Hendricks, staff architect and manager, to…
Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 Highlights
Read the original article: Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 Highlights In episode 16 of “Ask the Howlers,” host Stacia Tympanick, senior solution engineer, met up with Ryan Hendricks, staff architect and manager, to…
VMware Carbon Black Recognized as “Tech Exit of the Year” at New England Venture Capital Association’s 2020 NEVY Awards
Read the original article: VMware Carbon Black Recognized as “Tech Exit of the Year” at New England Venture Capital Association’s 2020 NEVY Awards This week, the New England Venture Capital Association named VMware Carbon Black winner of “Tech Exit of…
A Look Ahead: 9 Cybersecurity Predictions for 2021
Read the original article: A Look Ahead: 9 Cybersecurity Predictions for 2021 Following an unprecedented year, what’s to come for cybersecurity in 2021? The ripple effects of the global pandemic have created a new threat landscape. In March, 90% of…
VMware Carbon Black Cloud Adds Device Control
Read the original article: VMware Carbon Black Cloud Adds Device Control With most organizations now working remotely, the chances your employees may unintentionally use restricted devices and infect your network has grown exponentially. With this threat in mind, we’re happy…
VMware Carbon Black Cloud Adds Device Control for USB Storage Devices
Read the original article: VMware Carbon Black Cloud Adds Device Control for USB Storage Devices With most organizations now working remotely, the chances your employees may unintentionally use restricted devices and infect your network has grown exponentially. With this threat…
3 Ways to Hunt for the ZeroLogon Vulnerability on Your Windows Servers
Read the original article: 3 Ways to Hunt for the ZeroLogon Vulnerability on Your Windows Servers Vulnerability assessment and patch management can be painful time-consuming processes. From the Security team looking at vulnerability reports and prioritizing the riskiest ones for…
VMware Workspace Security: A Major Leap Towards Unified Endpoint Mobility & Security
Read the original article: VMware Workspace Security: A Major Leap Towards Unified Endpoint Mobility & Security The rate of change in the way people work, driven by the need to work remotely, has exacerbated IT and security concerns. And this…
Defining Cloud Workload Protection
Read the original article: Defining Cloud Workload Protection Organizations are now turning to an increasingly hybrid cloud infrastructure model to support remote workforces, a trend that has accelerated significantly amid the recent global health crisis. This presents a new challenge…
VMware Carbon Black Announces Splunk Integration to Streamline and Modernize SOC Workflows
Read the original article: VMware Carbon Black Announces Splunk Integration to Streamline and Modernize SOC Workflows Introducing Unified VMware Carbon Black Cloud App for Splunk At VMware Carbon Black, our ecosystem of integration and alliance partners has been a core…
Risk Score 101: What to look for in a Risk Score
Read the original article: Risk Score 101: What to look for in a Risk Score (Editor’s Note: Monica White, a guest author on the Carbon Black blog, is the Director of Product Marketing at Kenna Security) When we at Kenna…
Querying Windows Event Logs for Faster Investigation and Response
Read the original article: Querying Windows Event Logs for Faster Investigation and Response With this week’s release on the VMware Carbon Black Cloud, users can now remotely inspect Windows devices’ event logs to pull back information that could be helpful during an investigation or response scenario. This new capability…
VMware Carbon Black Named a Finalist in the 2020 CRN Tech Innovator Awards
Read the original article: VMware Carbon Black Named a Finalist in the 2020 CRN Tech Innovator Awards The post VMware Carbon Black Named a Finalist in the 2020 CRN Tech Innovator Awards appeared first on VMware Carbon Black. Become…
Secure Cloning: VMware Advances the State of the Art in Secure VDI Infrastructure
Read the original article: Secure Cloning: VMware Advances the State of the Art in Secure VDI Infrastructure The need for security in the workplace has changed. Remote work is the new normal and the result is drastic changes to an…
Countering a Home Invasion: Modernizing Threat Hunting Best Practices
Read the original article: Countering a Home Invasion: Modernizing Threat Hunting Best Practices The recently released VMware Carbon Black Global Incident Threat Report found that incidents of counter incident response (IR) are occurring in 82 percent of IR engagements. Counter…
TAU Threat Advisory: Imminent Ransomware threat to U.S. Healthcare and Public Health Sector
Read the original article: TAU Threat Advisory: Imminent Ransomware threat to U.S. Healthcare and Public Health Sector The post TAU Threat Advisory: Imminent Ransomware threat to U.S. Healthcare and Public Health Sector appeared first on VMware Carbon Black. Become…
Cybersecurity Awareness Month: 2020 in Retrospect
Read the original article: Cybersecurity Awareness Month: 2020 in Retrospect The post Cybersecurity Awareness Month: 2020 in Retrospect appeared first on VMware Carbon Black. Become a supporter of IT Security News and help us remove the ads. Read the…
Cybersecurity Awareness Checklist
Read the original article: Cybersecurity Awareness Checklist Cybersecurity Awareness Month (CAM 2020), in its 17th year, is an annual campaign in October that raises awareness on the importance of cybersecurity. This year’s theme is “Do Your Part. #BeCyberSmart” along with…
Cyber Insecurity: Securing the Vote in the 2020 Election
Read the original article: Cyber Insecurity: Securing the Vote in the 2020 Election The post Cyber Insecurity: Securing the Vote in the 2020 Election appeared first on VMware Carbon Black. Become a supporter of IT Security News and help…
Cybersecurity Awareness Checklist
Read the original article: Cybersecurity Awareness Checklist Cybersecurity Awareness Month (CAM 2020), in its 17th year, is an annual campaign in October that raises awareness on the importance of cybersecurity. This year’s theme is “Do Your Part. #BeCyberSmart” along with…
Crossing the Narrow Sea
Read the original article: Crossing the Narrow Sea Tom Kellermann, Head of Cybersecurity Strategy at VMware and Member of the Cyber Investigations Advisory Board of the United States Secret Service. “The Greatest trick the devil ever pulled was to convince…
Ransomware Attacks Targeting Healthcare Surge: VMware Carbon Black experts Weigh in
Read the original article: Ransomware Attacks Targeting Healthcare Surge: VMware Carbon Black experts Weigh in Targeted, sophisticated, and costly – over the past month, several high-profile ransomware attacks have been reported with a specific focus on some of the largest…
The Future of Remote Work: Connecting Security and IT — Webinar Highlights
Read the original article: The Future of Remote Work: Connecting Security and IT — Webinar Highlights The post The Future of Remote Work: Connecting Security and IT — Webinar Highlights appeared first on VMware Carbon Black. Advertise on IT…
Cybersecurity Awareness Month 2020: Top Resources on “If You Connect it, Protect it”
Read the original article: Cybersecurity Awareness Month 2020: Top Resources on “If You Connect it, Protect it” Leaves are turning red and gold, the temperature is dropping, and the smell of pumpkin spice is filling the air. It’s officially October!…
Better Secure and Manage Endpoints in a Remote Work World
Read the original article: Better Secure and Manage Endpoints in a Remote Work World The global pandemic has quickly changed how and where we work. Remote work is now the ‘new normal.’ Amid the massive transition, a June survey by…
VMworld 2020: Delivering Intrinsic Security to the World’s Digital Infrastructure
Read the original article: VMworld 2020: Delivering Intrinsic Security to the World’s Digital Infrastructure A year ago, we bet big, with a vision to truly disrupt the security industry — and ultimately help more customers stay safe from cyber attacks.…
Intrinsic Security at VMworld 2020
Read the original article: Intrinsic Security at VMworld 2020 VMworld 2020 kicked off today and for the first time ever, hundreds of security experts took the virtual stage to unveil how organizations can build a future read business with a truly unified security approach.…
Introducing VMware Carbon Black Cloud Workload™
Read the original article: Introducing VMware Carbon Black Cloud Workload™ If you know Carbon Black, you know that we helped invent Endpoint Detection and Response (EDR) and pioneered the field of next-generation anti-virus (NGAV) and malware protection. If you know…
Detecting Threats in Real-time With Active C2 Information
Read the original article: Detecting Threats in Real-time With Active C2 Information Often security practitioners rely on the reputation of IP Addresses to determine if traffic to and from that IOC is malicious. In practice, the reputation of IOCs, IPs…
The ABCs of Digital Distancing
Read the original article: The ABCs of Digital Distancing What is digital distancing? Like social distancing, digital distancing is the practice of isolating user access to networks, apps, and workloads to reduce the spread of malicious activity, and more effectively…
Top Three Demos at VMworld 2020: Security, Threat Hunting, and Beyond
Read the original article: Top Three Demos at VMworld 2020: Security, Threat Hunting, and Beyond VMworld 2020 (Sept. 29- Oct. 1) is fast approaching. This year, and for the first time ever, VMworld will showcase a new intrinsic security track featuring 50+ sessions on the future of workspace and workload security. Attendees will…
The U.S. Secret Service Selects Tom Kellermann to Serve on Inaugural Cyber Investigations Advisory Board
Read the original article: The U.S. Secret Service Selects Tom Kellermann to Serve on Inaugural Cyber Investigations Advisory Board Cybersecurity has become a recurring global news headline. From ransomware to data breaches, cyberattacks continue to be one of the biggest…
VMware Carbon Black First to Block Hidden Malicious Commands in Obfuscated Scripts
Read the original article: VMware Carbon Black First to Block Hidden Malicious Commands in Obfuscated Scripts For a long time now, our Threat Analysts have flagged the growing threat of script-based attacks, especially from Microsoft PowerShell and Windows Management Interface…
XDR Defined
Read the original article: XDR Defined The EDR market is going through the biggest period of change and innovative now. Historically, endpoint detection and response (EDR) was created to provide borderline protection for a system. It provides coverage for endpoints in an attack, and the…
Top Three Things I’m Looking Forward to at VMworld 2020
Read the original article: Top Three Things I’m Looking Forward to at VMworld 2020 VMworld 2020 (September 29 to October 1) is right around the corner. This year’s event is entirely virtual and offers a unique way for all attendees…
Top Six VMworld 2020 Sessions and Activities for a Threat Hunter
Read the original article: Top Six VMworld 2020 Sessions and Activities for a Threat Hunter I’m excited to be a part of VMworld 2020 as a speaker and as a member of VMware Carbon Black. This year at VMworld 2020, hundreds of security…
The Future of Security: Lessons from Black Hat USA
Read the original article: The Future of Security: Lessons from Black Hat USA The post The Future of Security: Lessons from Black Hat USA appeared first on VMware Carbon Black. Advertise on IT Security News. Read the original article:…
The Future of Security: Lessons from Black Hat USA
Read the original article: The Future of Security: Lessons from Black Hat USA The post The Future of Security: Lessons from Black Hat USA appeared first on VMware Carbon Black. Advertise on IT Security News. Read the original article:…
Freedom, Flexibility, and Security: The Future of Remote Work
Read the original article: Freedom, Flexibility, and Security: The Future of Remote Work Over the past few months, many digital heavy enterprises have optimized (or transformed) their operations to bolster business continuity and resilience. One of these changes is implementing…
Black Hat USA 2020: VMware Carbon Black Releases Global Incident Response Threat Report Detailing Surge in Cyberattacks Amid COVID-19
Read the original article: Black Hat USA 2020: VMware Carbon Black Releases Global Incident Response Threat Report Detailing Surge in Cyberattacks Amid COVID-19 At Black Hat USA this week, VMware Carbon Black unveils findings from the fifth installment of the…
Black Hat USA 2020: VMware Carbon Black Releases Global Incident Response Threat Report Detailing Surge in Cyberattacks Amid COVID-19
Read the original article: Black Hat USA 2020: VMware Carbon Black Releases Global Incident Response Threat Report Detailing Surge in Cyberattacks Amid COVID-19 At Black Hat USA this week, VMware Carbon Black unveils findings from the fifth installment of the…
Carbon Black EDR’s All-New Live Query Capability and Enhanced Fileless Visibility
Read the original article: Carbon Black EDR’s All-New Live Query Capability and Enhanced Fileless Visibility VMware Carbon Black is excited to announce that VMware Carbon Black EDR (formerly CB Response), recently named by Gartner as a 2020 Customers’ Choice for…
Carbon Black EDR’s All-New Live Query Capability and Enhanced Fileless Visibility
Read the original article: Carbon Black EDR’s All-New Live Query Capability and Enhanced Fileless Visibility VMware Carbon Black is excited to announce that VMware Carbon Black EDR (formerly CB Response), recently named by Gartner as a 2020 Customers’ Choice for…
TAU Threat Discovery: Cryptocurrency Clipper Malware Evolves
Read the original article: TAU Threat Discovery: Cryptocurrency Clipper Malware Evolves Clipper malware is designed to steal cryptocurrency from victims by replacing wallet addresses in the victim’s clipboard with wallet addresses that belong to the attacker. This stealthy technique is…
Fact vs. Fiction: 10 Endpoint Security Myths Debunked
Read the original article: Fact vs. Fiction: 10 Endpoint Security Myths Debunked Simply defined, endpoint security protects desktops, laptops, servers, and fixed-function devices from malicious internal and external threats. Endpoint security combines various threat detection, response and prevention technologies to help organizations disrupt cyberattacks. Despite the clear-cut definition, there’s still some confusion…
Tax Day Fraud: “Identity Theft Subscriptions” in High Demand on the Dark Web
Read the original article: Tax Day Fraud: “Identity Theft Subscriptions” in High Demand on the Dark Web With billions of stolen usernames, passwords, banking information and more circulating on the dark web, identity theft is an evolving and lucrative business,…
Tax Day Fraud: “Identity Theft Subscriptions” in High Demand on the Dark Web
Read the original article: Tax Day Fraud: “Identity Theft Subscriptions” in High Demand on the Dark Web With billions of stolen usernames, passwords, banking information and more circulating on the dark web, identity theft is an evolving and lucrative business,…
Ask the Howlers: Latest Threats and Security Challenges Part 1
Read the original article: Ask the Howlers: Latest Threats and Security Challenges Part 1 This is part of our ongoing bi-weekly webinar series called Ask the Howlers, where cybersecurity experts discuss the latest news, security challenges, and answer your questions.…
TAU Threat Discovery: Conti Ransomware
Read the original article: TAU Threat Discovery: Conti Ransomware Conti is a new family of ransomware observed in the wild by the Carbon Black Threat Analysis Unit (TAU). Unlike most ransomware, Conti contains unique features that separate it in terms of performance and focus…
TAU Threat Discovery: Conti Ransomware
Read the original article: TAU Threat Discovery: Conti Ransomware Conti is a new family of ransomware observed in the wild by the Carbon Black Threat Analysis Unit (TAU). Unlike most ransomware, Conti contains unique features that separate it in terms of performance and focus…
6 Best Practices to Fight a New Breed of Insider Threats
Read the original article: 6 Best Practices to Fight a New Breed of Insider Threats The current global pandemic has disrupted how organizations work. Some businesses quickly adapt while other organizations are still figuring out the new landscape. Unfortunately, criminals are exploiting…
TAU Threat Analysis: Bundlore (macOS) mm-install-macos
Read the original article: TAU Threat Analysis: Bundlore (macOS) mm-install-macos The mm-install-macos variant of the Bundlore family of macOS adware has been around for many years in many variations and delivery methods. Recently, a variant with a novel installation method was discovered. Although…
Popular Techniques Used by Cybercriminals Amid COVID-19
Read the original article: Popular Techniques Used by Cybercriminals Amid COVID-19 (Editor’s Note: Gary Stevens, a technology writer, is posting as a guest author to carbonblack.com). Cybercriminals constantly leverage fear and confusion by launching cyberattacks during major world events. Such attacks are…
Popular Techniques Used by Cybercriminals Amid COVID-19
Read the original article: Popular Techniques Used by Cybercriminals Amid COVID-19 (Editor’s Note: Gary Stevens, a technology writer, is posting as a guest author to carbonblack.com). Cybercriminals constantly leverage fear and confusion by launching cyberattacks during major world events. Such attacks are…
Broad, Ongoing Cyberattacks Targeting Australia Underscore Need for Behavioral-Based Cybersecurity
Read the original article: Broad, Ongoing Cyberattacks Targeting Australia Underscore Need for Behavioral-Based Cybersecurity Australia’s government revealed on Friday that the country has been under a broad cyberattack from a “state-based actor” targeting government, public services and businesses, Initial suspicions…
VMware Carbon Black and Dell Extend Endpoint Security Below the OS
Read the original article: VMware Carbon Black and Dell Extend Endpoint Security Below the OS As endpoint security continues to evolve and thwart legacy attack techniques, cyber criminals are always trying to stay one step ahead to avoid detection and…
TAU Threat Analysis: Relations to Hakbit Ransomware
Read the original article: TAU Threat Analysis: Relations to Hakbit Ransomware (See part one of TAU’s Hakbit Ransomware analysis here.) Many blue team defenders out there will attest to the fact that ransomware is on the rise, and that ransomware doesn’t appear…
Court Ruling on Forensic Data Breach Reporting Flying Under the Radar
Read the original article: Court Ruling on Forensic Data Breach Reporting Flying Under the Radar One thing that may have flown under the radar in recent weeks is that a court has ruled that Capital One must allow plaintiffs to…
TAU Threat Analysis: Relations to Hakbit Ransomware
Read the original article: TAU Threat Analysis: Relations to Hakbit Ransomware (See part one of TAU’s Hakbit Ransomware analysis here.) Many blue team defenders out there will attest to the fact that ransomware is on the rise, and that ransomware doesn’t appear…
Court Ruling on Forensic Data Breach Reporting Flying Under the Radar
Read the original article: Court Ruling on Forensic Data Breach Reporting Flying Under the Radar One thing that may have flown under the radar in recent weeks is that a court has ruled that Capital One must allow plaintiffs to…
TAU Threat Analysis: Hakbit Ransomware
Read the original article: TAU Threat Analysis: Hakbit Ransomware The bad actor(s) behind Hakbit ransomware recently released an updated variant of their ransomware, which encrypts the victim’s data and demands 3 Bitcoins in ransom payment. This updated variant is delivered via phishing email…
TAU Threat Analysis: Hakbit Ransomware
Read the original article: TAU Threat Analysis: Hakbit Ransomware The bad actor(s) behind Hakbit ransomware recently released an updated variant of their ransomware, which encrypts the victim’s data and demands 3 Bitcoins in ransom payment. This updated variant is delivered via phishing email…
Why SecOps is (Still) the Future
Read the original article: Why SecOps is (Still) the Future (**Editor’s Note: **Sam Bocetta, a guest author on the VMware Carbon Black blog, is a freelance journalist specializing in U.S. diplomacy and national security, with emphases on technology trends in cyber…
TAU Threat Analysis: Medusa Locker Ransomware
Read the original article: TAU Threat Analysis: Medusa Locker Ransomware In recent weeks Carbon Black’s Threat Analysis Unit (TAU) has seen an increase in the number of infections attributed to the Medusa Locker ransomware family. There were notable traits exhibited…
TAU Threat Analyis: Medusa Locker Ransomware
Read the original article: TAU Threat Analyis: Medusa Locker Ransomware In recent weeks Carbon Black’s Threat Analysis Unit (TAU) has seen an increase in the number of infections attributed to the Medusa Locker ransomware family. There were notable traits exhibited…
Bringing Intrinsic Security to Containers: VMware Acquires Octarine
Read the original article: Bringing Intrinsic Security to Containers: VMware Acquires Octarine UPDATE: On May 27, 2020 VMware officially closed its acquisition of Octarine. The blog post below has been amended to reflect that announcement. _______________________ Today is a very exciting day for VMware and…
Forrester Study: VMware Carbon Black Cloud Provides 379% ROI
Read the original article: Forrester Study: VMware Carbon Black Cloud Provides 379% ROI A newly published Forrester Consulting Total Economic Impact™ (TEI) study shows that organizations who replace their legacy endpoint security products with the VMware Carbon Black Cloud experience…
Bringing Intrinsic Security to Containers: VMware Acquires Octarine
Read the original article: Bringing Intrinsic Security to Containers: VMware Acquires Octarine UPDATE: On May 27, 2020 VMware officially closed its acquisition of Octarine. The blog post below has been amended to reflect that announcement. _______________________ Today is a very exciting day for VMware and…
Forrester Study: VMware Carbon Black Cloud Provides 379% ROI
Read the original article: Forrester Study: VMware Carbon Black Cloud Provides 379% ROI A newly published Forrester Consulting Total Economic Impact™ (TEI) study shows that organizations who replace their legacy endpoint security products with the VMware Carbon Black Cloud experience…
TAU Technical Report: New Attack Combines TinyPOS With Living-off-the-Land Techniques for Scraping Credit Card Data
Read the original article: TAU Technical Report: New Attack Combines TinyPOS With Living-off-the-Land Techniques for Scraping Credit Card Data In April of 2020 VMware Carbon Black Threat Analysis Unit (TAU) researchers worked with an Incident Response (IR) partner on a…
Third-Party Tests Rate VMware Carbon Black Cloud as a Leader in Protection, Detection; Platform Delivers 379% ROI for Customers
Read the original article: Third-Party Tests Rate VMware Carbon Black Cloud as a Leader in Protection, Detection; Platform Delivers 379% ROI for Customers The biggest endpoint protection question for organizations right now is whether or not to upgrade from legacy…