Detecting Phishing and Account Compromise in Office 365

The Top Seven Cybersecurity Horrors

…and how to protect yourself It’s Halloween! And before the night exposes the horrors from the netherworld, most of us still have to get through the wacky costumes at work. Just the same, the cybersecurity demons do not slow down, and our SOC superheroes must continue to save the world...

Inaugural Securonix Customer Excellence Awards Announced

The Securonix Customer Excellence Awards     The Securonix Customer Excellence Awards recognize forward thinking security leaders who are demonstrating a long-term vision to elevate the role and impact of security in their organizations, and have implemented cutting edge cybersecurity solutions to realize this vision. The Securonix Cybersecurity Excellence Awards...

Securonix Threat Research: KRONOS/Osiris Banking Trojan Attack

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team Figure 1: Document with Malicious VBA Macro used in Osiris Germany Campaign   Introduction The KRONOS malware was first discovered in June 2014 as a Banker Trojan available for purchase in a Russian underground forum for $7,000 [1]. After staying...

“5 Questions to Ask About Machine Learning,” a Securonix Response

By Igor Baikalov, Chief Scientist, Securonix In his January 31 article in Dark Reading titled “5 Questions to Ask about Machine Learning” Anup Gosh proposes 5 questions consumers should ask in order to separate marketing hyperbole from technical reality. The questions Gosh proposes are all good points that you should...

Security Analytics 2.0 and the Future!

By Sachin Nayyar, Chief Executive Officer, Securonix The internet has changed the lives of millions – billions of people around the world. It is how we connect, interact with one another, run our daily lives in both personal and professional situations. And with this drastic change, there is a new...