Top White Papers and Webcasts

  • Attacks have many phases. Before launching, the attacker needs to stage Internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. Attacks that target organizations often leverage email attachments or direct payload downloads. Yet attacks with an objective to exfiltrate data, still must initiate a command-and-control callback. This solution brief discusses a security solution that can block both initial exploit and …

  • The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk.     The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks …