Cyber security specialists Digital Craftsmen and Armor Defense are marking their partnership with a webinar featuring FBI veteran Miguel Clarke, a former Special Agent in the cyber security division and now global evangelist for cyber security. The webinar, titled ‘Into the Mind of the FBI – Give Yourself the Advantage’ is scheduled for 12:00 pm […]
Armor, a cybersecurity disrupter, further invests in cloud native MDR+ offering with new Head of Global Sales, Derek Boxdell. Armor, the global cloud-native managed detection and response (MDR) leader, announces that Derek Boxdell has joined the Armor leadership team as the new Head of Global Sales. Derek is an Armor alum and returns to continue his trailblazing career in cloud security. Most recently Derek […]
Armor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture. The review provides a picture of your organization’s existing approach for “people, process, and technology,” a recommendation on what is needed to combat threats facing your organization, and, finally, a path to reaching your desired state of maturity. […]
We’re continuing our blog series about Living-off-the-Land (LotL) attacks by focusing on a particularly fast-moving malware called Astaroth. Click here to view the first post, which goes into the characteristics of LotL binaries and how they work. First spotted in the wild in 2017, Astaroth is a highly prevalent, information-stealing Latin American banking trojan. It […]
Cyber trends tend to come and go, but one popular technique we’re seeing currently is the use of living-off-the-land binaries. The concept of “living off the land” (LotL) was first introduced by Christopher Campbell and Matt Graeber at Derbycon 3.0 (2013) and refers to attacker behavior when they use any binary supplied by the operating […]
Threat Analyst Lead Yaz Johnston dives into our latest security insights, where you can learn about upcoming HTML sanitization for your favorite web browsers, what top 10 malware threats we’ve seen in the past quarter, and how ransomware continues to steal the security spotlight. HTML Sanitization Google, Mozilla, and security firm Cure53 announced they are […]
Gala Technology is the innovative team behind the multi-award-winning, cloud-based, Pay-By-Link payment technology, SOTpay. SOTpay supports merchants, of all shapes and sizes, to enable them to protect themselves against the ever-growing risk of fraud-related chargebacks in ‘Card Not Present’ (CNP) channels, whilst simplifying complex PCI DSS requirements and reducing processing cost. The solution has received […]
This white paper looks at the types of tools, people, and financial resources needed to operate a highly functioning SOC, and the qualities needed for either an in-house or outsourced SOC to be effective.