Cybersecurity Mumbo Jumbo

Cybersecurity Mumbo Jumbo

The endpoint market is dazzlingly complex and crowded and full of vendors hawking their wares like carnival showmen. The situation has gotten so overly complicated that highly educated customers and those looking to make their first purchase are both lost as to the drizzling array of features. And almost everyone is now looking to add staff to manage...
Download
Dark-Web-Infographic

Dark-Web-Infographic

39% Percentage of adults in the U.S. using the same or very similar passwords for multiple online services, which increases to 47% for adults age 18-29 Passwords are a twentieth-century solution to a twenty-first century problem. Unfortunately, user names and passwords - the most common digital credentials used today - are all that stands between your...
Download
Idealstor Dark Web FAQ

Idealstor Dark Web FAQ

The Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search 0.04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the...
Download
IDEALSTOR MDR DataSheet

IDEALSTOR MDR DataSheet

Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect in an efficient timeframe. Effective endpoint security defenses must account for pre and post infection scenarios. Traditional and next generation antivirus [AV and NGAV] can be blind to sophisticated and state sponsored malware. Traditional endpoint...
Download
Laundry List of 2017 Data Breaches

Laundry List of 2017 Data Breaches

January 8, 2017: On December 30, 2016, ESEA, one of the largest video gaming communities, issued a warning to players after discovering a breach. At the time, it wasn’t known what was stolen and how many people were affected. However, in January, LeakedSource revealed that 1,503,707 ESEA records had been added to its database and that leaked records...
Download
SECURITY RESEARCH SHOWS AV & NGAV CAN BE EVADED

SECURITY RESEARCH SHOWS AV & NGAV CAN BE EVADED

Most AV and NGAV software has many parts. The most traditional part is the file scanning engine which can detect a file that is a known malware. It can also detect malware similar to malicious programs that are already known. This is the part which was called “antivirus” even 25 years ago. It scans all new files on your storage and ensures that...
Download
Ransomware , The known and Unknown

Ransomware , The known and Unknown

Ransomware is an increasingly popular tactic used to steal data and disrupt a system’s operations. Essentially, ransomware is malware used by attackers to infect a device, hijack files on that device and lock them, via encryption. These maliciously encrypted files can no longer be accessed by users, and are held hostage by the attacker until a ransom...
Download
Spectre and Meltdown FAQ

Spectre and Meltdown FAQ

Spectre and Meltdown are hardware vulnerabilities that allow an attacker running unprivileged code to read from privileged memory. For example, it allows a user-mode program such as notepad to read entire kernel memory. An attacker can leverage this as part of a privilege escalation attack, or under some scenarios, in remote exploits. Malware that attempts...
Download
The Idealstor Edge - Managed Detection and Response

The Idealstor Edge - Managed Detection and Response

Since there’s no fool-proof preventative measure to stop every single threat, every single time, we must rethink and evolve our cyber-security strategy. At Idealstor, we focus on the entire process, not just the first stage. If we can detect and respond to unknown threats in a timely manner, we can prevent facing the consequences of a network breach....
Download
When Powershell Attacks

When Powershell Attacks

While intended for system administration and the automation of daily maintenance and management tasks, PowerShell has become a preferred tool for cybercriminals. Using the framework’s flexibility to carry out reconnaissance, download payloads, and create lateral movement, threat actors are able to quickly create malicious scripts capable of downloading...
Download
Dark Web Monitoring

Dark Web Monitoring

Dark Web ID is the industry’s first commercial solution to detect your compromised credentials in realtime on the Dark Web. Using a proprietary technology, Dark Web ID vigilantly searches the most secretive corners of the Internet to find compromised credentials associated with your company, contractors and other personnel, and notifies you immediately...
Download
APTs and the Cyber Kill Chain

APTs and the Cyber Kill Chain

When analyzing Advanced Persistent Threats (APT), Lockheed Martin modeled the threat actor’s activity and coined the attack process the “Cyber Kill Chain” (CKC). It’s a rather simple model, easy to understand and digest. It’s no surprise that it’s heavily embraced by the cyber-security community looking to deal with the increasing threat...
Download