Threat Update: The Log4j vulnerability continues to be actively exploited. Immediate action to update and monitor potentially impacted systems is advised.
Botnets. Bots are compromised machines running software that is used by hackers to send spam, phishing attacks, and denial of service attacks.
Botnets are one of the 10 different types of malicious categories. zvelo’s classification engine detects botnets and other malicious exploits by leveraging advanced artificial intelligence and human supervised machine learning techniques for unparalleled coverage and accuracy in malicious detection.
Threat Alert: The Log4j vulnerability has quickly been weaponized and is being used to exploit exposed systems. Here’s what you should know.
Unpatched vulnerabilities cause one third of breaches. 34% of all vulnerabilities reported so far this remain unpatched. How are you mitigating your risks?
Like rabbits, ransomware seems to multiply at a prodigious rate. The newest strain causing widespread damage dubbed Bad Rabbit, due to the TOR hidden service it directs victims to visit, appears to be based on the Petya ransomware and its’ variants, according to Cisco Talos. The campaign seems to have largely targeted Russia and Eastern Europe.
It seems very strange that in the year 2017 (approximately 20 years from when the commercial use of the Internet first became possible), we are still dealing with email spam with no end in sight. There are many solutions now available in the industry that can be placed in various locations…
By Eric Watkins, Senior Malicious Detection Researcher at zvelo This week, a new security vulnerability subject to remote attack, known as Devil’s Ivy, is targeting the C++ library used by thousands of different IoT device vendors. The most popular devices being compromised are IoT video cameras; however, the associated risk is not limited to video…
*****The following article, by Jeff Finn, appears as an online article in the Opinion section on InfoSecurity Magazine Home’s web site and was originally published on July 13, 2017. In InfoSecurity Magazine: How IoT Device Discovery and Activity Detection Can Work by Jeff Finn, CEO of zvelo Even as IoT device volume races towards 200 billion by 2020, the…
The meteoric growth of the IoT industry has forced vendors to prioritize impressive top line features and cost efficiency, leaving security as an un-sexy afterthought.Details
IoT, Botnets, and DDoS attacks are on the rise and a significant problem for the internet, as well as your personal data. This blog outlines the risks, types of attacks, and even provides preventative measures for improved network and device security to keep you, your networks, and your IoT devices safe.
The Dow Jones Industrial Average recently dropped by about 145 points and the S&P 500 index lost $136.5 billion dollars in value after a tweet from the Associated Press claimed that an explosion had taken place in the White House and that President Obama was injured. The tweet turned out to be false and stemmed from a hacked Associated Press Twitter account. The precedent has been set for us to take a long, hard and uncomfortable look at the challenges we face when relying on automated trading systems that gauge and react to public sentiment and that end with drastic results.