Antivirus

Collaboration for end-to-end secure content

Digital content informs and facilitates every single aspect of business. We create and consume this content in innumerable ways, from our dependency on email to receive and send critical information and documents, to job application portals and shared storage services in the cloud. Therefore, it’s little wonder that digital content has become such a popular vehicle…


Digital content informs and facilitates every single aspect of business. We create and consume this content in innumerable ways, from our dependency on email to receive and send critical information and documents, to job application portals and shared storage services in the cloud. 

Therefore, it’s little wonder that digital content has become such a popular vehicle for cyber criminals for both getting threats into and information out of an organisation. Criminals are increasingly pursuing sophisticated techniques to infect content, including the use of zero-day and undetectable threats. Just this month, researchers discovered a new malware infiltration technique being used in the wild that allows attackers to trigger payloads when victims preview documents.

Similarly, once in the organisation, cyber criminals are also using content as a means of exfiltrating information. Indeed, Deep Secure researchers have demonstrated that attackers could use commands delivered over Twitter to steal more than 300,000 credit card details by concealing them into just 50 images – all while completely avoiding detection. The risk posed by content is presented at every turn and nowhere more so than with corporate access to the Internet via Web browsing and social media.

  • Tackling cybercrime with a culture of security
  • Digital transformation is putting security at risk
  • Microsoft: The future of security is AI

Achieving end-to-end defences

Whether an employee, a supply chain partner or a customer, every stakeholder in a business needs to know that the content they are engaging with is digitally pure and threat-free. However, security teams have a tough job keeping pace with a dynamic and highly developed threat landscape, and with cyber criminals who innovate faster than most Fortune 500 companies.

Traditional network defence solutions are no match for threats concealed in content – whether achieved through steganograph

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

The Main Street Tech Report: Microsoft Says Third Party Antivirus Software Is No Longer Needed

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports
Read More

Continue Reading
Antivirus

Researchers warn Microsoft Defender vulnerability is already being exploited

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…
Read More

Continue Reading
Antivirus

Signed software abused to deploy antivirus-killing scripts

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …
Read More

Continue Reading
Antivirus

Stop falling for scams when Norton’s antivirus software is 70% off right now

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…
Read More

Continue Reading