Tag: Cylance Blog

Was Your New Disney Plus Account Stolen?

As of March 2020, the Disney Plus service already has 28.6 million subscribers. But within the first few days of the Disney Plus launch, many users were reporting that their accounts had been hacked…   Advertise on IT Security News.…

Why Mobile Phones Make Teens Safer

In this article, we’ll take a look at some of the ways owning a mobile phone can benefit teens, and explore issues such as developing trust between a teen and their parents, and when the right age is to give…

Video: Renovo and the Car that Produces 32TB of Data a Day

Renovo’s software layer accelerates the development of large-scale, latency-sensitive applications at the edge. With it, you can drastically improve the ability to move data with the power of the cloud.   Advertise on IT Security News. Read the complete article:…

Webinar: Safeguard Citizens and Students from Cyber Attacks

Join us March 10th to learn how SLED organizations can prevent ransomware from breaching their defenses with AI-based security solutions from BlackBerry Cylance.   Advertise on IT Security News. Read the complete article: Webinar: Safeguard Citizens and Students from Cyber…

CylancePROTECT vs. DoppelPaymer, BitPaymer and Dridex

In this video, we demonstrate the prevention capabilities of our endpoint protection solution CylancePROTECT against attacks combining Emotet or Dridex along with a ransomware payload like BitPaymer or DoppelPaymer.   Advertise on IT Security News. Read the complete article: CylancePROTECT…

Threat Spotlight: Nuke Ransomware

Nuke ransomware encrypts files with an AES 256-bit encryption key and changes the file name to random characters with a .nuclear55 extension. Our Threat Research team analyzed a Nuke sample – this blog details our investigation.   Advertise on IT…

Threat Research Report: The State of Cryptomining

Technology outpaces security; throughout history we’ve often leveraged technology before fully exploring its risks. In this blog, we’ll provide instruction on how to protect your organization from cryptomining attacks.   Advertise on IT Security News. Read the complete article: Threat…

BlackBerry Cylance vs. IcedID Banking Trojan

IcedID, originally known as BokBot, is a banking Trojan with infostealing capabilities. IcedID targets banking portals, payment card providers, mobile services providers, payroll portals, and online retail websites.   Advertise on IT Security News. Read the complete article: BlackBerry Cylance…

Case Study: Jouve Digital Takes on Cybersecurity

This is the story of a digital firm that transformed its endpoint defense strategy from reactive to proactive prevention by partnering with BlackBerry Cylance.   Advertise on IT Security News. Read the complete article: Case Study: Jouve Digital Takes on…

Three Different Ways Teens Can Get Phished

In this blog post, I’ll talk about the hidden dangers of phishing and how even the most Internet-savvy teens can fall for techniques used by the bad guys to gain access to our personal information and account logins.   Advertise…

Why Not All Artificial Intelligence is Created Equal

The 21st century marks the rise of artificial intelligence (AI) capabilities for mass consumption. Companies are looking to spend on innovation to secure against cyber threats, but how do you make sense of the claims?   Advertise on IT Security…

A Ransomware Prescription for the Healthcare Industry

Ransomware attacks increased with a vengeance last year, impacting more than 750 healthcare providers and racking up recovery costs approaching $4 billion. What can be done to secure the healthcare industry?   Advertise on IT Security News. Read the complete…

A Teen’s Take on Cyberbullying

I’m sure you’ve known at least one person in your life who was bullied. When our parents were our age, they were more likely to be bullied physically by kids they knew. Kids our age are much more likely to…

How to Keep Employees Safe From Phishing Campaigns

Phishing is often a successful attack vector because bypassing employees is usually easier than breaching a company’s firewall or antivirus protection. In this article, we’ll go over some tips to keep employees safe from attack.   Advertise on IT Security…

Christopher Bray: When Risk Travels from Office to Home

BlackBerry Cylance Smart Antivirus General Manager Christopher Bray updates us on the latest developments that bring artificial intelligence-powered security to the mobile ecosystem.   Advertise on IT Security News. Read the complete article: Christopher Bray: When Risk Travels from Office…

Threat Spotlight: Amadey Bot Targets Non-Russian Users

Amadey is a Trojan bot primarily used for collecting information on a victim’s environment, though it can also deliver malware. This blog reveals the detailed behavior of Amadey and examines its recent AZORult campaign.   Advertise on IT Security News.…