Whitepaper

Securing Remote Workers in the Age of Teleworking

Commercial and government enterprises are facing unprecedented challenges due to the coronavirus pandemic. Many private enterprises and government agencies quickly started preparations to enable teleworking for employees. In a recent survey, approximately 44 percent of consumers with full-time employment have already felt the impact of coronavirus on their business operations, approximately 55 percent have already […]

Securing Remote Workers in the Age of Teleworking Read More »

Methodology for Characterizing Network Behavior of Internet of Things Devices

The National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) is working to improve the ability of network administrators and operators of Internet of Things (IoT) networks to identify, understand, and document network communication requirements of IoT devices. Documenting the types of devices and communication behaviors of those devices can allow

Methodology for Characterizing Network Behavior of Internet of Things Devices Read More »

New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong

Author: Radu Tudorica – Security Researcher, Cyber Threat Intelligence LabCo-authors: Alexandru Maximciuc – Team Leder, Cyber Threat Intelligence Lab Cristina Vatamanu – Senior Team Leader, Cyber Threat Intelligence Lab Bitdefender researchers have discovered a new TrickBot module (rdpScanDll) built for RDP bruteforcing operations on select targets. The new module was discovered on January 30 and,

New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong Read More »

Application Access Redefined: Managing the Modern Workforce

The paradigm shift sweeping enterprise technology and business gets more palpable by the day. The transition to cloud computing is near its tipping point. Mergers and acquisitions have burgeoned. And with a growing number of end users outside the corporate environment, IT departments need to serve an increasingly diverse, distributed, and demanding user ecosystem. Providing

Application Access Redefined: Managing the Modern Workforce Read More »

The National Security Agency’s recommendations for cloud security

Cloud adoption comes with numerous advantages and benefits to an organization, but it also comes with a certain amount of risk. As the cloud industry becomes more mainstream, the underlying concept of cloud technology still isn’t fully understood by everyone who uses it, making security decisions a hassle. To ease the confusion, the National Security

The National Security Agency’s recommendations for cloud security Read More »

Kr00k – CVE-2019-15126

Kr00k – CVE-2019-15126 is a vulnerability that affected billions of devices, potentially causing the leak of sensitive data and opening a new attack vector for blackhats. Following the discovery of the vulnerability, ESET responsibly disclosed it to the affected chip manufacturers Broadcom and Cypress (and, initially, to Amazon). We also contacted ICASI to ensure that

Kr00k – CVE-2019-15126 Read More »

ESET Deep Behavioral Inspection

Deep Behavioral Inspection – the latest addition to the ESET HIPS layer, introduced in early 2019 – addresses such techniques by thoroughly inspecting API calls made by suspicious or unknown processes. This, together with other HIPS modules and ESET’s multi-layered detection engine, provides ESET customers with superior protection to their data and devices.

ESET Deep Behavioral Inspection Read More »