Blog

Erasing for Safety: General Data Protection Regulation (GDPR)

Published on May 26, 2020

By: Sujay Doshi, Senior Product Manager for Cyber Threat Content Abhishek RVRK Sharma, Senior Technical Marketing Engineer   (Image source: Pixabay.com) “You’ve just been erased,” said John Kruger (Arnold Schwarzenegger) to Lee Cullen (Vanessa Williams) as he made her part of the Witness Security Protection Program (Eraser (1996)). According to...

What is UEBA? Six Essential Features of User and Entity Behavior Analytics

Published on May 7, 2020

User and Entity Behavior Analytics (UEBA) offers mature cloud, SaaS, and on-premises behavior analytics of security data from SIEMs, the cloud, and security products. It works by expanding users to include entities such as machines and internet addresses. UEBA monitors these users' interactions with data, systems, and applications to define...

Securonix Threat Research: Securing Your Remote Workforce – Detecting Teleconferencing Tools Attacks in the Work-From-Home (WFH) World – Part 2

Published on May 6, 2020

By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team   Figure 1: Remote Work/Teleconferencing Tools (Zoom) UNC Path Vulnerability Exploitation - I   The Securonix Threat Research team has recently been observing a number of new attacks/security issues reported involving different remote workforce teleconferencing applications (TA), including Zoom,...

Securonix COVID-19 Cyber Threat Update – May 6, 2020

Published on May 6, 2020

Securonix observes a significant uptick in phishing, business email compromise, and data compromise attacks.   By Oleg Kolesnikov, Kayzad Vanskuiwalla, Aditya TS, Securonix Threat Research Team   The Securonix “COVID-19 Work From Home” task force continues to research the cyber security challenges organizations are facing during this pandemic. In this...

Securonix Threat Research: Securing Your Remote Workforce – Detecting the Latest Cyberattacks in the Work-From-Home (WFH) World: Part 1

Published on April 1, 2020

By Oleg Kolesnikov, Securonix Threat Research Team   Figure 1: Malware Exploiting Live Coronavirus Map   In recent weeks, as many businesses have been rushing to institute a shift to remote work due to the COVID-19/coronavirus situation, we have been observing malicious threat actors attempting to exploit an increasing number...

What is an Insider Threat?

Published on March 26, 2020

By Abhishek RVRK Sharma, Senior Technical Marketing Engineer When the trusted becomes malicious Insider threats. You’ve surely heard the term, and how it is the most dangerous and damaging cyberthreat an enterprise can face. The US Department of Homeland Security defines an insider threat as “a current or former employee,...

Threat Briefing: Securonix COVID-19 Cyber Threat Update – March 16, 2020

Published on March 16, 2020

As the Coronavirus (COVID-19) continues to disrupt communities throughout the world in unprecedented ways, we at Securonix Threat Research team, would like to take this opportunity to reiterate our commitment to enhance monitoring capabilities during this tough time. We have started to see several organizations cancel events, and businesses shift their workforce to...