Remove Antivirus Remove Data collection Remove Social Engineering Remove Threat Detection
article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

Group-IB, a Singapore-based cybersecurity company: ransomware accounted for over half of all malicious mailings in H1 2019 , detected and analyzed by Group-IB’s Computer Emergency Response Team (CERT-GIB), with Troldesh aka Shade being the most popular tool among cybercriminals. More than 80% of all malicious files were disguised as .zip

article thumbnail

Drawing the RedLine – Insider Threats in Cybersecurity

Security Boulevard

Data collection from FTP clients, IM clients. Through a combination of technical and procedural solutions, most of the issues caused by insider threats can be mitigated: Defense Against Phishing. Users should receive regular social engineering training about what to look for in phishing emails and messages.

article thumbnail

34 Most Common Types of Network Security Protections

eSecurity Planet

Vulnerability Management Product Guides 8 Best Vulnerability Scanner Tools Top 10 Open Source Vulnerability Assessment Tools 12 Top Vulnerability Management Tools Threat Intelligence and Detection At the most basic level, threat detection strategies and tools monitor networks for suspicious and anomalous activity.