GuardiCore Named 2016 Cybersecurity Leader for Breach Detection and Response by Cyber Defense Magazine

Award Recognizes Innovation and Best-in-Class Leadership

San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center security and breach detection, today announced that it has been named a 2016 CyberSecurity Leader by Cyber Defense Magazine, the industry’s leading electronic information security magazine. Being named a CyberSecurity Leader affirms GuardiCore’s vision that security must keep up with the rate of constant change, closing the gap between traditional security technology and a sophisticated threat actor’s ingenuity. Award winners will be recognized in a special October edition of Cyber Warnings e-Magazine, during National Cyber Security Awareness Month.

Read more

GuardiCore helps security teams see into apps and networks before they segment

The digital business era has brought with it a number of new tools and technologies, such as software-defined networking (SDN), Internet of Things (IoT), mobility and the cloud. These innovations enable businesses to increase their level of dynamism and be more distributed, but they also increase the complexity of securing the business. Old-school security methods and tools do not work in an environment where the perimeter is eroding and resources are becoming more virtual and cloud-centric.

GuardiCore Reveal lets security teams discover, monitor and visualize activity inside the data center, as well as control traffic through micro-segmentation policies.

How Next Gen Security Can Help Finance Firms Stay on the Right Side of New Euro Laws

Financial services firms have never faced a more agile and determined online foe. Barclays Global CISO Troels Oerting said recently that elite cybercrime gangs armed with advanced malware and a sophisticated skillset pose a major threat to the industry. They can get deeper inside networks, stay hidden for longer and steal more data than ever before. Additionally, as if that weren’t enough to worry about, coming European data protection laws will introduce a stringent new set of requirements and penalties on businesses, forcing improvements to cybersecurity.

Read more

New Virus Attacks All Windows-based Computers

A new type of malware is beginning to circulate and attack nationwide, according to GuardiCore, a vendor of software that detects breaches in real time. And, right now, the malware can be detected by only two anti-virus engines.

“This is new malware capable of running on every Windows version from XP through Server 2012 R2,” the company reported in a blog. That means it runs on every single Windows version, “so 100 percent of your Windows endpoints are vulnerable,” says Daniel Goldberg, a security researcher at GuardiCore. The malware has been named Trojan.sysscan.

Ravaging RDP Servers? Backdoor Trojan Ramps Up Enterprise Risk

Trojan-laden malware remains a huge problem for enterprises and individual users alike. As noted by Palo Alto Networks, some cybercriminals are targeting users with creative Mac OS X malware that uses a PDF detailing Russian space program projects over the next decade as a decoy to infect systems with information-stealing code. Softpedia, meanwhile, reported that enterprises have more to fear from a new set of brute-force remote desktop protocol (RDP) attacks that use a backdoor Trojan to infect connected servers and grab everything from banking credentials to tax data and browser cookies. Here’s a look at the new RDP risk.

Brand-New Delphi Trojan Exfiltrates Vast Amounts of Info

A never-before-seen credential-stealing Trojan has been uncovered, found to be backdooring machines and exfiltrating large amounts of information. Written in Delphi coding language (should we call it the Oracle at Delphi?), the Trojan.sysscan malware is being used by a single source as the payload for attacks that repeatedly use brute-force passwords for RDP credentials, according to GuardiCore.

The Oracle of Delphi Will Steal Your Credentials

It was one of those warm summer nights, no clouds, just a bright full moon lighting the way. Someone had unknowingly stumbled upon our honeypot, completely unaware of the fact that her every move was recorded and fully analyzed. Thanks to our deception technology, we could easily reroute the attacker, making her believe she reached her real target.