Blog

17 Results / Page 2 of 2

The Facebook Hack is the proof we need to embrace Maching Learning Threat Detection and Response for faster threat detection

today02/10/2018

  • 7
close

Blog Elizabeth Gladen

The Facebook Hack Is The Proof We Need!

The Facebook Hack – The proof we need to embrace Machine Learning Threat Detection Tools for faster detection and response, by Martin Cook, Cyber Solutions Architect, Cyberseer. Whilst the Wall Street Journal reports that Facebook could land a $1.63 billion dollar fine from the European Union under the new GDPR regulations, ...

today08/04/2018

  • 196
close

Blog Elizabeth Gladen

Covert Channels – Detecting DNS Tunnelling

Intro Domain Name System (DNS) is a fundamental protocol and naming system that enables computers, services or other applications connected to the internet or a private network that make use of domain names to work. It translates more readily memorised domain names into numerical IP addresses needed for locating and ...

Wannacry Ransomware Stopped

today15/05/2017

  • 22
close

Blog Elizabeth Gladen

Blog: WannaCry Ransomware Stopped

Today, Cyberseer Analysts saw WannaCry ransomware in several customer environments, including a leading insurance group. Instead of causing disruption, it had been stopped at the early stages. Our Analysts discovered the suspicious domain activity whilst using machine learning technology Darktrace. Wana_Decrypt0r_screenshot.png  Cyberseers managed services is powered by machine learning technology Darktrace, ...

Blog Security in the Cloud

today22/04/2017

  • 6
close

Blog Elizabeth Gladen

Blog: Security in the Cloud

The Raconteur Cloud for Business supplement (published by The Sunday Times) categorises the top cloud concerns of IT departments worldwide in its infographic “trust and security in the cloud.” It’s clear that the benefits of cloud adoption are significant in enabling business transformations, innovations and operational excellence. However, the absence ...

today14/03/2017

  • 73
close

Blog Elizabeth Gladen

Blog: Routine of a Website Malware Attack

A website malware attack is proving to be a popular choice with criminals. Attackers increasingly exploit web servers, the websites they host, and the people who use them. Over the last few years there has been a steady growth in the number of website vulnerabilities, with more than 75 percent ...

AI FUELLED HUMAN THREAT HUNTING IS CHANGING THE FACE OF CYBER SECURITY

today09/01/2017

  • 67
close

Blog Elizabeth Gladen

Blog – Trend for 2017 & Beyond – Artificial Intelligence Fuelled Human Threat Hunting

Artificial Intelligence Fuelled Human Threat Hunting Is Changing The Face of Cyber Security As cyber attackers continually look for new ways to infiltrate and compromise networks, Information Security teams are faced with a sheer mass of new emerging threats. Clearly, building higher walls with the same traditional security technologies isn’t ...

Detecting Ransomware the good bay and unknown

today10/06/2016

  • 22
close

Blog Elizabeth Gladen

Blog: Detecting Ransomware – The Good, the Bad, and the Unknown

Ransomware has become one of the most widespread and damaging threats that businesses or organisations face. Since CryptoLocker first appeared in 2013, there has been an ever-increasing number of file-encrypting Ransomware variants commonly delivered through attachments from spammed e-mail, downloaded from malicious pages through malvertisements, or dropped by exploit kits ...

Detecting Dridex without signatures

today15/03/2016

  • 39
close

Blog Elizabeth Gladen

Blog: Detecting Dridex without Signatures

Cyberseer deploy advanced threat detection solutions as part of its managed security services, across a range of businesses and industries. Recently, one of Cyberseer’s clients was hit with a phishing campaign aiming to plant the Dridex malware within its network. While the client’s e-mail gateway blocked 90% of the e-mails, ...