By Teresa Wingfield Security Has Been the Same for Years Here’s a short recap of one of the more interesting observations by Nyotron’s CTO Nir Gaist during a recent Down the Rabbit Hole Podcast on endpoint security. He argues that security hasn’t really changed in over 30 years! Most, including Gaist, acknowledge that next-generation antivirus […]

By Teresa Wingfield What does every cyberattack since Stuxnet have in common? Regardless of the method of the attack, an attacker bypassed multiple layers of security technologies, penetrated the network and wreaked havoc on the organization. Once inside, the intention of the hacker is always to steal, delete, manipulate, encrypt or exfiltrate data. Your security […]

By Vera Drobov & Daniel Prizmant What is Controlled Folder Access? With the release of Windows 10 Fall Creators Update, Microsoft added a new feature called Controlled Folder Access (CFA) to Windows Defender Exploit Guard. This features allows users to control which processes can access certain folders to help protect data from malicious programs, such […]

By Teresa Wingfield During March 2018, a ransomware outbreak struck several US organizations, including the City of Atlanta and the City of Baltimore (disabling its 911 dispatch system). These attacks caused serious damage and disrupted work activity. In Atlanta: “The attack has had far-reaching impacts—crippling the court system, keeping residents from paying their water bills, […]

By Teresa Wingfield Malware is winning… “Sometime around 1992 the amount of Badness in the Internet began to vastly outweigh the amount of Goodness.”1 Endpoint security is constantly changing with the malware landscape, but has had a lot of challenges keeping up with unknown threats. Here’s a quick overview of how endpoint protection has evolved […]

By Rene Kolga When investigating malicious attacks on organizations, once in a while you encounter typos and other spelling mistakes left by hackers in either their malware code or entered during their interactive sessions with compromised systems. This can be something as simple as misspelling the word “complete” as “complate”. For example: During an interactive […]

Nyotron’s security research team began tracking new active OilRig attacks on a number of organizations across the Middle East in November 2017.  Our team has discovered that the Iran-linked OilRig group has significantly evolved its tactics, techniques and procedures (TTPs), introduced next-generation malware tools and new data exfiltration methods since previous attacks. Among key advancements, […]

By Teresa Wingfield Nyotron’s PARANOID is the industry’s first OS-Centric Positive Security solution that strengthens your endpoint protection. We will be in the South Hall, booth #1639 at RSA Conference 2018 and would love to meet you. We will have great security experts, entertainment and swag waiting: Hear our Founder, Nir Gaist, give his “AV is […]

By Teresa Wingfield Machine Learning (ML) has become the foundational pillar of security products such as next-generation antivirus, endpoint detection and response and user and entity behavior analytics. While these products have greatly improved malware detection over traditional antivirus solutions, complete protection remains elusive for a number of reasons outlined below.   The past doesn’t […]

By Teresa Wingfield Last year, the healthcare industry was the top vertical impacted by malware (more on this in a minute). One of the most notable events involved NotPetya malware that disrupted transcription services used by healthcare customers of Nuance Communications. This year isn’t going to be any better. Already, at least two major healthcare […]

Subscribe to our blog

Follow us on Social Media