Category: Articles

APEX Platform 4.6

NEW Release – APEX™ Platform 4.6 Delivers Greater Fidelity on Confirmed Cyber Attacks and Threats

Prevailion is excited to launch six new features in its latest release of the APEX™ Platform, version 4.6.  The features, outlined below, give organizations higher fidelity on real-time compromise activity empowering your security and cyber risk teams to be more effective, work faster, and immediately prioritize confirmed threats. Over the past four months, APEX™ Platform […]

Wells Fargo image

A Note on the Trojan Compromise of NCR Corporation

Prevailion recently disclosed an active trojan compromise in the network of NCR Corporation. We at Prevailion are extremely pleased that NCR has taken this matter seriously, including the engagement of an elite IR team, and we applaud them for their quick and diligent response to the compromise we detected inside their network. As with all […]

E-commerce, Shopping online.

Masquerading as Card-Skimmers: Are Attackers Doing More with Magecart?

While Magecart is well known as a malware hacking groups use to inject card-skimming scripts into e-commerce platforms, Prevailion researchers have detected many compromises with Magecart that suggest the malicious actors are not actually going after credit card data.  According to public data breach records, the credit card information of organizations from British Airways to […]

Prevailion - Carnival Cruise Lines - dashboard screenshot

Carnival Cruise Lines’ Long-Running Breach Problem

Carnival Corporation is back in the news again with another data breach. This time, the company disclosed in a recent 8-K filing that its network was compromised by an unnamed ransomware on August 15th which “encrypted a portion of one brand’s information technology systems” and “the download of certain of our data files.” This is […]

Word writing text Threat Intelligence. Business concept for analyzed and refined information about potential attacks.

Lower the Price Tag of a Data Breach with Threat Intelligence

Detecting and containing a data breach takes the better part of a year, approximately 280 days, for the average organization, according to IBM’s 15th annual Cost of a Data Breach Report, Unfortunately, the longer it takes to identify a breach, the bigger the price tag of the overall breach lifecycle.  This year’s report found that […]

Woman using tablet pc, pressing on virtual screen and selecting compliance.

How Auditors Can Make Compliance Programs More Effective

When conducting an audit of your cybersecurity plans, it’s important to reassess risk and evaluate whether established policies and procedures are both effective and actionable. To aid in cyber compliance, CSO Online said the updated compliance guidelines issued by the Department of Justice, “has particular relevance to the cybersecurity practices of organizations when it comes […]

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.