payload

Results 1 - 11 of 11Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"Nothing kills attacks earlier than DNS-layer security. Protection both before and during the attack Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains.
Tags : 
     Cisco Umbrella EMEA
By: Alert Logic     Published Date: May 23, 2019
Security has always been a fast-paced field, but lately the pace has been accelerating. Malware is rapidly evolving. The ways payloads are being delivered and deployed are changing, too. New attack tools and exploit techniques are appearing more regularly. It’s taking less time for them to gain widespread adoption. For all of those reasons, we thought it would be valuable to share additional insight into the threatscape we shared in the 2018 Critical Watch Report.
Tags : 
     Alert Logic
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Infosys     Published Date: May 21, 2018
Commercial airplanes are expensive and complicated machines - which means two things. First, airlines have to get the best possible return from their investment by using them as much as possible. Long-haul flights can keep an airplane in the air for up to 20 hours every day, earning money for the airline with every passing minute. However, the planes makes no money on the ground, so airlines have to maintain and service the aircraft efficiently, and get it back in the air with a new payload of passengers as quickly as possible. Therefore, the MRO (Maintenance, Repair, and Overhaul) is a critical and complex part of an airline's business and one of the key factors in making the business successful. Aircraft are the geese that lay golden eggs for the airline. So the airlines need to look after them.
Tags : airplane, passengers, payload, maintenance, repair, overhaul, business
     Infosys
By: FICO - APAC     Published Date: Jul 10, 2017
As a subsidiary of the world’s largest food company, Nestlé USA is laser-focused on doing more with fewer resources and adopting highly efficient technologies and processes, including machine learning and prescriptive analytics. With 64 brands consisting of numerous products in each brand, maximizing payload and minimizing transportation costs is an extremely complex problem – particularly when you factor in demand forecasts and current supply levels.
Tags : 
     FICO - APAC
By: FICO     Published Date: Jun 06, 2017
As a subsidiary of the world’s largest food company, Nestlé USA is laser-focused on doing more with fewer resources and adopting highly efficient technologies and processes, including machine learning and prescriptive analytics. With 64 brands consisting of numerous products in each brand, maximizing payload and minimizing transportation costs is an extremely complex problem – particularly when you factor in demand forecasts and current supply levels.
Tags : manufacturing, manufacturing optimization, manufacturing solutions
     FICO
By: Sophos     Published Date: Mar 30, 2017
Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read this paper to learn more about exploits and how to stop them. We’ll explore how exploits work, the exploit industry overall, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organization against advanced and unknown threats.
Tags : malware, antivirus solutions, exploit protection, security software, exploit kits, software protection, backdoor protection
     Sophos
By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : akamai, cybersecurity, security, ddos, ddos attack, web security, networking, enterprise applications
     Akamai Technologies
By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : microsoft, security, best practices, data
     LogRhythm
By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
     Intel Security
By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : hacker detection, advanced evasion techniques, network security, it security, security management
     McAfee
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com