exploit engine

Results 1 - 5 of 5Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management
    
Alert Logic
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
By exploiting popular places on the Internet, such as search engines, social networking and email, malnets have become very adept at infecting many users with little added investment.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus, virus, network security, gfi, email exploit, nimda, yaha, bugbear, exploit software, exploit engine, mailsecurity
    
GFI
Published By: Pindrop Security     Published Date: Mar 21, 2018
For a long time, the phone channel was thought to be isolated and less important to defend, when compared to the physical and online channels. The general consensus was that fraudsters could only steal so much over the phone, and it had little impact on fraud across the rest of the organization. But those assumptions are wrong, and they’re becoming grossly inaccurate as technology evolves. The phone channel is now more vulnerable and exploitable than ever before, as annual fraud loss is now a $14 billion problem. Between aggressive fraud rings, social engineering and sophisticated techniques, vulnerable call centers are feeling the sting. Legacy and stand-alone solutions won’t stand up to the perseverance and lengths to which fraudsters are willing to go.
Tags : 
    
Pindrop Security
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: