article thumbnail

An interview with cyber threat hunter Hiep Hinh

Malwarebytes

In this post, Hiep breaks down his threat hunting career and shares tips and best practices for those looking to become a cyber threat hunter (or who are just interested to listen!). Threat hunting is all about nipping stealthy attackers (and malware) in the bud. Hiep’s advice? ” says Hiep.

article thumbnail

Introducing Malwarebytes Managed Detection and Response (MDR)

Malwarebytes

Underpinned by our award-winning EDR technology , Malwarebytes MDR offers powerful and affordable threat prevention and remediation services, provided by a team of cybersecurity experts that remotely monitors your network 24/7 to detect, analyze, and prioritize threats. Cyber threat hunting for SMBs: How MDR can help.

B2B 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 Things Every CISO Needs to Know About PKI

Security Boulevard

With a reliable PKI infrastructure, you can provide the utmost protection for your company’s information assets and technologies. With the rapid evolution of today’s technology, calculating where true risk lies can be extremely challenging. Read the FREE eBook. "> Off. Accelerate your business to differentiate. UTM Medium.

CISO 52
article thumbnail

What is ransomware-as-a-service and how is it evolving?

Malwarebytes

RaaS is not much different, in theory, from the software-as-a-service (SaaS) business model, where cloud providers “rent out” their technology to you on a subscription basis—just swap out ‘cloud providers’ with ‘ransomware gangs’ and ‘technology’ with ransomware (and the related crimes involved).

article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Read more about the hidden costs of ransomware in our eBook. Attacks increased 510% from January to February, with eBay and Apple the brands most often targeted (we believe these numbers were due to buyers increasingly looking online as product shortages and technology needs arose).

article thumbnail

How to Accelerate Government Transformation by Reducing Risk, Complexity, and Cost

Thales Cloud Protection & Licensing

Widely derided as the consummate example of inefficiency, government agencies around the world are transforming their services and ultimately its perception by the public with the adoption of new technology and platforms. Governments also leveraged technology to deal with the effects of the pandemic.

article thumbnail

Let Humans Be Humans and AI Be AI

Security Boulevard

LogicHub’s unique decision automation technology can build clients the ultimate security playbook in a matter of minutes. What if you could build your own playbook for tackling the threats and challenges of the current landscape — in less than 30 minutes? Our platform is not solely AI-driven. Human, meet machine. LogicHub solves both.