Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwire) -- 08/29/12 -- FireEye®, Inc., the leader in stopping advanced cyber attacks, today announced the release of its 1H 2012 Advanced Threat Report. According to the FireEye report, the first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed throw-away domains to infiltrate enterprise networks.
The Advanced Threat Report is based on data from the FireEye Malware Protection Cloud, a service powered by thousands of FireEye appliances, as well as direct malware intelligence uncovered by its research team. The report provides a global view into cyber attacks that routinely bypass traditional defenses, including firewalls, next-generation firewalls, intrusion prevention systems (IPS), gateways, and anti-virus (AV). Research from FireEye shows that over 95% of companies are compromised by advanced malware and most are not aware of the attack.
Key findings in the Advanced Threat Report include:
"The results of this report make it even more clear that reactive signature-based defenses cannot prevent evasive strains of malware from making their way into the enterprise," said Ashar Aziz, FireEye founder, CEO and CTO. "Attackers continue to remain a step ahead of traditional defenses, so organizations must rethink their IT security architecture and implement appropriate security measures to prevent advanced cyber attacks such as zero-day attacks and advanced persistent threats (APTs)."
As cybercriminals develop and invest in advanced malware, enterprises must reinforce their traditional defenses with a new layer of dynamic security that is able to detect unknown threats in real-time, thwarting malware communications back to command and control servers and blocking data exfiltration. This extra layer of defense needs to be designed specifically to fight the unknown and zero-day tactics common in targeted attacks and APTs.
For a full copy of the Advanced Threat Report, please visit http://www2.fireeye.com/advanced-threat-report-1h2012.html.
About the FireEye Malware Protection Cloud
The FireEye Malware Protection Cloud offers real-time security data sharing among interconnected FireEye appliances deployed within customer networks, technology partner networks, and service providers around the world. This worldwide cloud shares auto-generated malware security intelligence, such as exploit tactics, malware signatures, and covert callback channels, as well as findings from the FireEye Malware Intelligence Lab.
About FireEye, Inc.
FireEye is the leader in stopping advanced cyber attacks that use advanced malware, zero-day exploits, and APT tactics. The FireEye solutions supplement traditional and next-generation firewalls, IPS, anti-virus, and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry's only solution that detects and blocks attacks across both Web and email threat vectors as well as latent malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats. Based in Milpitas, California, FireEye is backed by premier financial partners including Sequoia Capital, Norwest Venture Partners, and Juniper Networks.
FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media Contact
FireEye
Lisa Matichak
+1.408.321.6300
Email Contact
LEWIS Pulse
Katherine Nellums
+1.415.432.2451
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs