Cybersecurity and Data Privacy BlogDarren Williams2019-02-06T10:13:09-07:00
Cybersecurity and Data Privacy Blog
BlackFog's Blog keeps you up to date on the latest data privacy and fileless cybersecurity news
BlackFog’s Data Privacy and Fileless Cybersecurity Blog ensures you are well informed in a constantly changing landscape. Keep a close watch on our blogs to see what we are up to and some of our thoughts in this area.
Many cyber security companies can tell you when an attack has taken place or when data breach has occurred. Few provide a preventative, multi-layered approach that can combat the growing number of threats we see today.
The threat landscape we see today is vastly different and infinitely more sophisticated. The days of protecting yourself from bad actors using a single antivirus solution are now behind us. Fileless network protection is a key element to device security and an important part of the layered security strategy.
Fileless network protection is a key element to device security and is an important part of a layered approach to security. The days of protecting yourself from bad actors using AntiVirus (AV) solutions are behind us.
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.
Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.