Media coverage

Breadth vs Depth: Attacker behaviour detection

Sorry, this post has not been published yet, check again later!

January 13, 2021
Published by:

Digitalisation World

Any piece of cloud service, software or hardware could represent a way into the system if a new vulnerability is discovered by hackers. Cyber criminals are continually looking for new exploits, producing new strains of malware or tinkering with existing strains just enough to alter their threat profile and evade signature-based detection solutions. Tactics have also evolved at a rapid pace, from the use of social engineering techniques in the initial attack to methods for evading detection once a network is compromised.

Read publication

Most recent media coverage

What could the Biden presidency mean for cybersecurity?

January 21, 2021

Verdict

Read more

Researchers Find New Form of Malware Used in the SolarWinds Attack

January 20, 2021

Silicon Angle

Read more

#Inauguration2021: Cyber-Experts React as Joe Biden Set to Become 46th US President

January 20, 2021

InfoSecurity

Read more