Prevailion Increases Malware Coverage by 45%

Prevailion Increases Malware Coverage by 45% featured image - AAA

Prevailion’s threat intelligence team has substantially increased our monitoring of malicious cyber activity over the last month.

The APEX™ Platform now tracks over 205 malware families, marking a 45% increase since the start of September. We have also increased our monitoring of malicious beacons by 20%, with more than 32 billion C2 communications collected.

This expanded coverage of malware communications provides the industry’s most advanced, comprehensive view of nation-state and criminal actor campaigns that are actively targeting corporations, governments, non-government organizations and their suppliers worldwide. Many of the active cyber compromises seen by APEX™ remain undetected by the victim organizations and their partners.

Prevailion collects telemetry directly from the adversary. Our APEX™ Platform is currently tracking:

  • 33 billion malicious beacons
  • 488,000 infected IP addresses
  • 28,000 compromised organizations
  • 208 malware families

Later this year, we will be releasing a new update to APEX™, which will make it easier for users to search the platform for specific malware and threat actor activity. This update is due to roll out by the end of Q4.

Watch this video to learn more about the APEX Platform.

The Latest

Under Attack!

Read some thoughts from our CTO, Nate Warfield, who discusses the escalating attacks on critical infrastructure with other cybersecurity experts in this Industrial Week roundtable.  

Do You Even DNS Log Bro?

by Will Gragido, Chief Strategy Officer – Prevailion, Inc. Intelligence analysis is dependent upon many things not the least of which are collections and access to data (e.g., pcaps, logs etc.) sourced from within the network. Prevailion affords its customers the ability to view intelligence related to real state of compromise outside the network’s perimeter. […]

Fox Business – Colonial Pipeline Attack

Prevailion’s CEO, Karim Hijazi discusses Colonial Pipeline Attack impact and possibilities with Liz Claman and Phil Flynn on Fox Business.

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.