Blog

Securonix and Cylance: End-to-End AI-Enabled Security Intelligence and Threat Prevention

Published on October 11, 2018

Suspicious activity on the endpoint is usually an indicator that a larger cybersecurity threat or attack is occurring. Your users are continually targeted by various attacks–phishing, malicious websites, session-based attacks and more—that end up playing out on the endpoints inside your organization. While understanding anomalous behaviors on your endpoints is...

Inaugural Securonix Customer Excellence Awards Announced

Published on September 28, 2018

    The Securonix Customer Excellence Awards recognize forward thinking security leaders who are demonstrating a long-term vision to elevate the role and impact of security in their organizations, and have implemented cutting edge cybersecurity solutions to realize this vision. The Securonix Cybersecurity Excellence Awards were distributed at a special...

Securonix Threat Research: KRONOS/Osiris Banking Trojan Attack

Published on September 11, 2018

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team Figure 1: Document with Malicious VBA Macro used in Osiris Germany Campaign   Introduction The KRONOS malware was first discovered in June 2014 as a Banker Trojan available for purchase in a Russian underground forum for $7,000 [1]. After staying...

“5 Questions to Ask About Machine Learning,” a Securonix Response

Published on August 30, 2018

By Igor Baikalov, Chief Scientist, Securonix In his January 31 article in Dark Reading titled “5 Questions to Ask about Machine Learning” Anup Gosh proposes 5 questions consumers should ask in order to separate marketing hyperbole from technical reality. The questions Gosh proposes are all good points that you should...

Security Analytics 2.0 and the Future!

Published on August 7, 2018

By Sachin Nayyar, Chief Executive Officer, Securonix The internet has changed the lives of millions – billions of people around the world. It is how we connect, interact with one another, run our daily lives in both personal and professional situations. And with this drastic change, there is a new...

Addressing the Cyber Skills Shortage Using AI and Machine Learning

Published on August 2, 2018

The cybersecurity industry faces a tremendous challenge in the form of a massive skills shortage. According to Forbes magazine over 40,000 security jobs are currently unfulfilled and organizations are struggling to fill another 200,000 positions. It is imperative for organizations to rapidly adopt artificial intelligence (AI) and automation technologies if...

Securonix Threat Research: GandCrab Ransomware Attack

Published on July 18, 2018

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team     Figure 1: GandCrab Phishing Email   Introduction The GandCrab ransomware attacks are some of the most prevalent ransomware threats of 2018. In recent months, the GandCrab attackers were able to infect more than 50,000 victims and generate more...

Securonix Threat Research: Cryptojacking Attacks

Published on June 19, 2018

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team   Figure 1: Persistent Cryptomining Jex Boss Initial Foothold Payload - Repeated Payload Execution Attempts   Introduction Cryptojacking is the unauthorized use of someone else’s computer to secretly mine cryptocurrency (also known as virtual or digital currency). According to a...