Looking for:

What Matters Most: Outlining the Steps to Define and Protect Mission-Critical Assets

by Jeffrey Lewis

posted at May 5, 2020

Nearly every single organization, whether a small business or large international enterprise, goes through non-optional steps to determine how best to comprehensively secure their environment. This process often starts with identifying the organization’s top priorities, which requires them to ask themselves a critical question: “What matters most?” In order to establish strategic groundwork for implementing

Growing Awareness of the Darknet in China following Huge Domestic Database Breaches

by Verint Cyber Threat Intelligence Research Team

posted at November 27, 2018

In recent weeks, we have identified a growing awareness on Chinese security blogs and mainstream media, to the existence of the Darknet, and the activities of Chinese users on its platforms. The focus is mostly on the sale of leaked data, mainly of Chinese citizens. One of these leaks pertained to the Huazhu hotel group

Discovery of a New Nymaim Malware Variant Employing Advanced Delivery, Obfuscation and Blacklisting methods

by Verint Research Lab

posted at October 27, 2016

Verint’s Cyber Research team has discovered an unknown variant of the Nymaim malware family, a group of threats that are also capable of downloading various malicious payloads onto the affected device, ranging from Ransomware to Banking Trojans. Background Nymaim is a malware family that was prevalent in 2013 but has recently reemerged on the threat landscape.