WireLurker: A New Era in OS X and iOS Malware

WireLurker: A New Era in OS X and iOS Malware

Today we published a new research paper on WireLurker, a family of malware targeting both Mac OS and iOS systems for the past six months. We believe that this malware family heralds a new era in malware attacking Apple’s desktop and mobile platforms based on the following characteristics: Of known malware families distributed through trojanized [...]

Web Security Tips: How PAN-DB Plays an Important Role in the Cyber “Kill Chain”

Web Security Tips: How PAN-DB Plays an Important Role in the Cyber “Kill Chain”

Organizations are facing persistent, elusive and sophisticated cyber-attacks more than ever. Sometimes these attacks might seem unavoidable, leading you to believe that your network and data cannot be protected. But if you think about how cybercriminals need to successfully infiltrate your network, remember the various steps in the cyber kill chain required to do so, [...]

Bringing a Semblance of Order to Policy Chaos

Bringing a Semblance of Order to Policy Chaos

Ask firewall administrators about their day-to-day challenges and sooner or later they will come around to one that I am calling policy chaos. The term chaos aptly defines both the daily fire drills associated with physical firewall appliances as well as the rapid rate of change typical of moving into a cloud or virtualized environment. [...]