article thumbnail

Securing Containers with NIST 800-190 and MVISION CNAPP

McAfee

Companies have moved quickly to embrace cloud native applications and infrastructure to take advantage of cloud provider systems and to align their design decisions with cloud properties of scalability, resilience, and security first architectures.

article thumbnail

10 Cybersecurity Trends That Emerged in 2023

Security Boulevard

The problem of malware, specifically its ever-shifting flavors, has been plaguing us for decades. Apparently, an employee at Company X used an LLM to help them finish a whitepaper. We need to remove biases about cybersecurity, particularly the false idea that security architecture, tools and systems we build are effective walls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to confuse antimalware neural networks. Adversarial attacks and protection

SecureList

Nowadays, cybersecurity companies implement a variety of methods to discover new, previously unknown malware files. In this article we attempt to attack our product anti-malware neural network models and check existing defense methods. A collection of these malware files with inserted random benign file parts was formed.

Malware 126
article thumbnail

Establishing Security Maturity Through CIS Cyber Defense Framework

McAfee

In this blog we set out to see how choosing the correct security controls framework can go a long way in establishing a secure foundation, which then allows Enterprise security designers/decision makers to make more informed solution choices while selecting the controls and vendor architectures.

article thumbnail

Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation

Security Boulevard

Their project README has some information on the background of the project in their own words, and the following resources give some more information on this awesome project: blog post , whitepaper , Black Hat USA slides , BlackHat USA presentation. Revoke-Obfuscation and this post stick purely to the obfuscation detection problem.

article thumbnail

10 Lessons Learned from the Top Cyber Threats of 2021

Security Boulevard

We published a whitepaper about Tactics, Techniques, and Procedures (TTPs) and also tools utilized by the DarkSide threat actors. . It was mostly exploited by crypto-mining malware. Most notably, US-based Colonial Pipeline Company paid 4.4 million USD after its operations were brought to a halt by this ransomware campaign in May 2021.