The APEX™ Platform now tracks over 205 malware families, marking a 45% increase since the start of September. We have also increased our monitoring of malicious beacons by 20%, with more than 32 billion C2 communications collected.
This expanded coverage of malware communications provides the industry’s most advanced, comprehensive view of nation-state and criminal actor campaigns that are actively targeting corporations, governments, non-government organizations and their suppliers worldwide. Many of the active cyber compromises seen by APEX™ remain undetected by the victim organizations and their partners.
Later this year, we will be releasing a new update to APEX™, which will make it easier for users to search the platform for specific malware and threat actor activity. This update is due to roll out by the end of Q4.
Undoubtedly, news that a Florida water plant had been hacked raised a lot of alarms outside the cybersecurity industry. The idea that a water source could be contaminated hit home for many Americans, highlighting the vulnerability of the nation’s utilities and critical infrastructure. But this attack came as no surprise to security experts. It was […]
Despite the many regulations from GDPR to CCPA, HIPAA, and PCI DSS that mandate a company report a data breach, many corporate hacks go unreported. Certainly, compliance is a driving force for the organizations that do report a data breach. Still, in 2019, CSO Online reported that the FBI’s Internet Crime Complaint Center received reports […]
Over a decade ago, security researchers at Microsoft identified a computer worm and dubbed it Ramnit. The malware family, “infects Windows executable files (.EXE) and HTML files (.HTML). It can also give a malicious hacker access to your PC. It spreads through infected removable drives, such as USB flash drives,” Microsoft warned. Fast forward to […]