Ransomware
Next Layer Protection Against Known and Unknown Cyber Threats
THE CHALLENGE: Although enterprises spend millions of dollars on cyber security, the attacks, which are constantly updated, will easily bypass firewall, Sandbox, Mail Relay / Mail Gateway and Anti-Virus systems in use within organizations. How is protection against unknown cyber threats assured? How is the safety of files exchanged on the LAN-WAN assured? Is the…
Read MoreIs Phishing getting better of worse?
Phishing as an E mail attack is not new. Attackers are well aware that humans are typically the weakest link in any organization and the constant rise of phishing attacks confirms it to be true. The more success phishing attacks have, the more they are perpetrated. There are a constant array of new tools to…
Read MoreMSSP’s – Are you sure your current Email protection technology is sufficient to protect your customer’s e mail box?
So, let’s talk about it. What is involved in great Email protection, and what does an MSSP need in order to provide improved Content Disarm and Reconstruction (CDR) protection to their customers? Files that enter the internal sensitive network, via any medium, especially Emails with attachments, can be infected with a wide range of threats.…
Read More#Petya #WannaCry; Lessons Learned?
Here we go again. Just a different name. #Petya, #Wannacry not much difference in the mass damage they have caused. We are all abundantly aware. #wannacry Ransomware has now been reported in more than 150 countries around the globe, affecting hundreds of thousands of machines and more than 10,000 companies. WannaCry spreads by taking advantage…
Read MoreDear CISO: One way to make attachments as fast and as safe as E-mail…
Regarding your response written on the Symantec website https://www.symantec.com/connect/forums/sanitizing-email-attachements-what-i-would-have?list_context_id=1611&list_context_type=sc_forum regarding your plea of what you would like to have when sanitizing E-mail attachments. It’s true everybody needs E-mails. And let’s be really frank, everybody needs those E-mails to have clean attachments. You cannot separate between the E-mails and their attachments. Standard formats even word, excel,…
Read MoreCalling CISO’s: Can you really trust a PDF document containing a Digital Signature based on Script?
The challenge: Today many official incoming documents into an organization are received by Email, in a PDF format. Some of them are digital invoices received by the finance department, which by law, need to be signed digitally, and to be stored for years. The purpose of the embedded Digital Signature authenticates two things; That the…
Read MoreLessons Learned From The Global Cyber-Attack
Carnage over the weekend, with a massive global cyber-attack, that according to the European Union’s law enforcement agency Europol is affecting 200,000 computers worldwide, disrupting industries across the globe in 12 countries. Victims include, FedEx, Renault, Nissan, Germany-s Autobahn and Spain’s Telefonica Telecommunications. In the UK, the National Health System had to turn away people…
Read MoreResponse to Cyber Attack on Government and Public Institutions April 2017
On April 26, 2017, the Israeli National Cyber Authority (NCA) published it had thwarted a massive cyber-attack on Israeli businesses and infrastructure in recent days in an effort to hurt the Israeli economy. The NCA explained that the cyber-attack was based on sending posing emails in the name of the victim organization, and was targeted against 210…
Read MoreStructure Based Filtering for Unstructured Data
SC Magazine recently reported that Millions of Microsoft Office 365 users were potentially exposed to a massive zero-day Ransomware attack last week. During the last 18 months, we have heard about extensive modern Ransomware and APT attacks caused by infected files that entered the network un-detected. Files that enter the internal sensitive network, via any channel,…
Read More