Category: Blogs

Home > News > Blogs

 Get a Single View of WAF Events with the Imperva AppSecurity View App for Splunk Enterprise

27/09/2017 by in category Blogs

Get a Single View of WAF Events with the Imperva AppSecurity View App for Splunk Enterprise   Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. A compilation of analyst predictions by SecureWorks, shows that the cloud continues to gain momentum as organizations embrace […]

0 0 Read more

Generations of Machine Learning in Cybersecurity

31/08/2017 by in category Blogs

Generations of Machine Learning in Cybersecurity     A new white paper is available from our Data Science team on machine learning. Snag your copy today! In this white paper, we aim to define generations of machine learning and to explain the maturity levels of artificial intelligence and machine learning that are being applied to cybersecurity […]

0 0 Read more

IDENTITY & ACCESS MANAGEMENT THAT PREPARES YOUR BUSINESS FOR TAKEOFF

02/08/2017 by in category Blogs

IDENTITY & ACCESS MANAGEMENT THAT PREPARES YOUR BUSINESS FOR TAKEOFF With 63% of confirmed data breaches* involving weak, default or stolen passwords, identity has become the most consequential attack vector organisations are facing today. As organisations embrace cloud, mobile and web applications, the attack surface increases as does the probability that a single compromised identity […]

0 0 Read more

What’s Next for Ransomware: Data Corruption, Exfiltration and Disruption

07/07/2017 by in category Blogs

What’s Next for Ransomware: Data Corruption, Exfiltration and Disruption

0 0 Read more

Blue Cube’s Response to Petya Ransomware Global Attack

29/06/2017 by in category Blogs

As I’m sure you have all seen, the latest news reports of a new Petya-like global attack is spreading fast. The attack uses the NSA’s External Blue exploit involved in last months WannaCry outbreak. The details of how the malware is behaving is still developing but what’s been found so far is the ransomware primarily […]

0 0 Read more

Sophos Update – Petrwrap/PetyaWrap

28/06/2017 by in category Blogs

What we know so far: Petrwrap/PetyaWrap seems to be very similar to a less prevalent variant of ransomware that was seen last year, called GoldenEye.  Specifically, they both vary slightly to other more common ransomware, in that they target the master boot record of the OS rather than individual files.  This renders the machine fairly […]

0 0 Read more

Cylance – Here to help with Petya-like Ransomware

28/06/2017 by in category Blogs

I wanted to share with you all of the Cylance communications on the “Petya-Like” Ransomware attack so that you have further information to share with customers who are remediating from this today.   Dominating the news currently are reports of a new, widespread, “Petya-like” global ransomware attack. Cylance® Threat Guidance is currently in possession of the […]

0 0 Read more

Petya Ransomware Spreading Fast Using Same Wannacry Exploit

28/06/2017 by in category Blogs

Petya Ransomware Spreading Fast Using Same Wannacry Exploit

0 0 Read more

Why You Need a Database Audit Trail

28/06/2017 by in category Blogs

Why You Need a Database Audit Trail

0 0 Read more

ASERT Situational Threat Brief WannaCry

15/06/2017 by in category Blogs

ASERT Situational Threat Brief WannaCry

0 0 Read more
12

©2017 BLUE CUBE SECURITY LTD. ALL RIGHTS RESERVED.