+971 4 254 1982
sales@securepoint.ae
 

Blogs

Cloud-based services have revolutionized cyber security. Repeatedly, cloud providers have demonstrated that their systems can outcompete onsite solutions in terms of effectiveness, efficiency, and security. Indeed, the cloud makes it possible to easily and safely outsource certain aspects of a company’s IT systems to a capable cloud provider. In addition, cloud-based services are less resource intensive for the client company and can therefore be an...

Read More

Fileless malware seems to be rearing its head. So how do you protect your organization against attacks that have no files to scan?   Executing attacks in memory rather than through executable files seems to be coming back strongly. Last year saw some visible attacks e.g. against several banks with this technique, which as such is nothing new, but has now made a comeback.   The term ‘fileless’ is...

Read More

The Necurs botnet has learned a new trick. Instead of spewing spam delivering Locky ransomware, the notorious botnet is now capable of launching DDoS attacks.   According to BitSight’s Anubis Labs, the malware was modified in September to include a module that adds DDoS capabilities and new proxy command-and-control communication functions. Necurs is the malware that makes up the botnet that goes by the same name and is currently...

Read More

Ransomware generated an estimated $200 million for attackers during the first quarter of 2016, and the researchers believe it’s only a matter of time before critical industrial systems are compromised and held for ransom. Cybersecurity have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. After gaining access, the researchers were able to command programmable...

Read More

For now, it’s just a lab experiment, but the researchers behind the first industrial control system ransomware believe it’s just a matter of time before criminals take note.   Imagine a group of hackers was able to infect the tiny computers that control critical infrastructure, such as power plants or water treatment facilities, also known as Programmable Logic Controllers or PLCs. The hackers could then lock these...

Read More

Phishing is more than just the obvious scams you find in your spam folder. Reliable security solutions are a big help. They can certainly cut down on the classic “spam and scam” threats. And even if something does get through, surely everyone knows that poorly written emails asking for your bank account info or passwords are scams. Right?     If phishing were that simple, it would be extinct. But...

Read More