aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
11/2/2016 9:23:05 AM
Contributor:
James Maude

How to dismantle an atomic bomb

Security researchers at enSilo recently released a novel code injection technique for Windows known as ‘Atom Bombing’. This is so called because it exploits Windows atom tables and Async procedure calls (APC) to evade detection by many common security solutions.

Continue reading
Date published
12/4/2015 8:00:38 AM
Contributor:
Mark Walker

Security by default: No more leaky buckets

Here at Avecto we believe that security products should be secure by design, meaning that they are designed from the ground up to be secure. A key principle is that you should be able to share details of the design without compromising its security, as opposed to security by obscurity, where you are reliant on keeping the solution secret to prevent a compromise.

Continue reading
Date published
5/1/2015 7:31:36 AM
Contributor:
James Maude

File less fears

Since the popular Angler Exploit Kit started delivering Poweliks file less malware in late 2014 malware authors have been turning to this technique to bypass detection and infect systems.

Continue reading
Date published
11/27/2014 4:12:10 PM
Contributor:
James Maude

Phishy deals on Cyber Monday?

As America recovers from Turkey overload this Thanksgiving, thrifty shoppers are dusting off their credit cards to satisfy an altogether different appetite - the appetite for a bargain. With Black Friday already upon us and Cyber Monday just around the corner, online retailers are offering their most tempting holiday deals.

Continue reading