Quantcast
Channel: Dell SecureWorks Security and Compliance Blog
Browsing all 22 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Stegoloader: A Wolf in Sheep’s Clothing

Dell SecureWorks Counter Threat Unit™ (CTU) researchers analyzed a stealthy malware family named Stegoloader that has been active since at least 2013 and yet is relatively unknown. It has been...

View Article



Image may be NSFW.
Clik here to view.

Vertical Hopscotch

Dell SecureWorks Counter Threat UnitTM (CTU) researchers have previously discussed ways for enterprises to exploit threat intelligence to better detect and respond to compromises. IT professionals...

View Article

Small Businesses Suffer Many Breaches

Good things come in little packages. That’s why cyber-thieves go after small businesses. Although it’s rare to read a story about a business that was breached that isn’t a national company, small...

View Article

Cyber Security Table Stakes for Companies: The Bare Minimum Needed to Survive

Can Your Company Survive Without Information Security? Nobody ever said now that the company is doing well, let’s drop the CEO and CFO and use that money for other things like R&D or new products....

View Article

This Just In: What Tomorrow’s Breach Means For You

Another day, another headline – another breach. Whether you’re securing your company or your identity, with each compromising headline, we ask ourselves how we’ll be impacted, how it happened and how...

View Article


A Breach is Just One Click Away – How to Use Training and Technology to...

If you’ve read our blog or followed us on LinkedIn or Twitter, you probably know we talk a lot about security awareness training. You might have attended our security awareness training webcast and...

View Article

Image may be NSFW.
Clik here to view.

Visit Dell SecureWorks at Black Hat USA

Black Hat USA 2015, one of the world’s most technical and relevant global information security events, is approaching, and Dell SecureWorks will be there to offer insights about the current...

View Article

Image may be NSFW.
Clik here to view.

Technical Analysis Tracks the Sakula Malware Family

Dell SecureWorks Counter Threat Unit™ (CTU) researchers conducted a longitudinal analysis of the malware family called Sakula (also known as Sakurel and VIPER), which targeted organizations in...

View Article


Image may be NSFW.
Clik here to view.

Revealing the Cyber-Kraken

Few security researchers possess the skills to detect elusive threat actors and gather the evidence of Advanced Persistent Threat (APT) groups lurking beneath the surface of legitimate-appearing...

View Article


Image may be NSFW.
Clik here to view.

Negative Feedback – Attack on a YouTube Channel

Recently, one of my favorite YouTube channels, Dave Jones’ EEVblog, came under attack after having published a series of videos debunking a product claiming to vastly extend the life of alkaline...

View Article

Walk, Don’t Run: A Security Framework for a Healthy Network (Part 1)

Just as no business becomes an overnight sensation, neither does an organization’s security posture. Security is a process, not a destination.  It takes time, patience and hard work. You must start...

View Article

Walk, Don’t Run: A Security Framework for a Healthy Network (Part 2)

Just as no business becomes an overnight sensation, neither does an organization’s security posture. It takes time, patience and hard work. You must start with the basics, work up to advanced moves and...

View Article

Image may be NSFW.
Clik here to view.

Fake Profiles, Fake Networks, Real Threat: Suspected Iran-Based Cyber Threat...

Figure 1. Cartoon about Internet identity published in The New Yorker. (Source: Peter Steiner The New Yorker Collection/The Cartoon Bank)   Trust and identity on the Internet are ongoing issues. As...

View Article


There’s a Weakness in Your Organization’s Security – It’s You

It’s football season. You’ve got your media room, your grill, and your beer-stocked fridge. Your fantasy team has been drafted, and you’re ready for Sunday’s game, eager to ridicule your friends as...

View Article

Walk, Don’t Run: A Security Framework for a Healthy Network (Part 3)

Just as no business becomes an overnight sensation, neither does an organization’s security posture. It takes time, patience and hard work. You must start with the basics, work up to advanced moves and...

View Article


How to Avoid Common Security Pitfalls While Staying Constantly Connected

The benefits of mobile devices and public computers are endless, but that constant connectivity doesn’t come without risks. If you don’t take security precautions, your device could become infected. If...

View Article

Cover Their Tracks: How Attackers are Hiding C&C Communication

Staying hidden is one of the primary goals of an attacker, making the arms race between cybercriminals and security professionals a never-ending battle. At the recent Black Hat Europe 2015 conference...

View Article


Are Boards Missing an Opportunity to Mitigate Cybersecurity Risk?

You can’t read a corporate governance publication or blog today without getting advice about the board of directors’ role in incident response planning. It’s an expected reaction as corporate officers...

View Article

Concerns Regarding eDellroot Certificate

Although Dell SecureWorks was not engaged to test this particular customer support component (eg: the on-the-box support certificate), Dell has a robust product development and testing cycle that we...

View Article

Six Tips for Protecting Yourself When Holiday Shopping

Black Friday and Cyber Monday saw record traffic and record online sales. But merchants selling their wares are not the only ones who took notice – nefarious individuals hoping to perpetrate fraud for...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images