Blogs
The latest cybersecurity trends, best practices, security vulnerabilities, and more
Blogs | Perspectives
Applying Intelligence from The CyberThreat Report: November 2024
By John Fokker · November 20, 2024
Attackers continue to widen their scope, targeting new industries and deploying increasingly refined techniques, which leaves the playing field anything but static. The attack surface keeps growing as organizations adopt more digital technologies and bridge systems across platforms, creating new entry points that attackers can exploit.
RECENT STORIES
Safeguarding Election Integrity: Threat Hunting for the U.S. Elections
By Max Kersten, Ernesto Provecho, and John Fokker · December 20, 2024
With 2024 being a major election year globally, the stakes for election security were and remain high. More than 60 countries, including the United States, Mexico, India, and Indonesia, held elections and engaged nearly 2 billion voters. The U.S. general election on November 5th, 2024, drew significant attention due to concerns over potential interference and cybersecurity threats.
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now
By Jambul Tologonov, John Fokker and Duy-Phuc Pham · November 20, 2024
On November 18th, the US Justice Department unsealed criminal charges against a Russian national for allegedly administering the sale, distribution, and operation of Phobos ransomware. Phobos is considered an evolution of Dharma Ransomware (aka CrySIS). Code similarities and ransom notes suggest that the creators are either the same or closely connected.
AIOps - Revolutionizing Incident Management with Advanced Automation and LLM Integration
By Andrews Samuel and Praveen Soraganvi · November 14, 2024
AIOps platform represents a significant advancement in IT operations management by combining the power of LLM/GenAI, hierarchical-based correlation, graph databases, ITSM integration, and Workflow automation engines.
Transforming Threat Actor Research into a Strong Defense Strategy
By James Murphy, Ale Houspanossian, Leandro Velasco LV and Ilya Kolmanovich · November 14, 2024
What does it take to transform threat actor intelligence into advanced detection engineering? This blog explores how Trellix responds to an ever-changing threat landscape.
MacOS Malware Surges as Corporate Usage Grows
By Ilya Kolmanovich, Prashant Kadam, Duy-Phuc Pham, Max Kersten and Joe Malenfant · October 29, 2024
As more companies adopt macOS for their corporate needs, attackers are adapting their techniques to get what they want.
RECENT NEWS
-
Dec 10, 2024
Trellix Encryption Solutions Protect Data From Insider Threats
-
Dec 9, 2024
Trellix Achieves U.S. Department of Defense IL5 Certification to Protect Mission-Critical Data
-
Dec 9, 2024
U.S. Navy Chooses Trellix to Protect Navy Enterprise Grid from Stealth Cyber Threats
-
Dec 5, 2024
Trellix Named 2024 AWS Technology Partner of the Year Award Winner for Sub-Saharan Africa (SSA) Region
-
Dec 2, 2024
Trellix Achieves the AWS Generative AI Competency
Get the latest
Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Zero spam. Unsubscribe at any time.