82 Results
Steve TrillingSenior Vice President and General Manager, Security Analytics and Research, Symantec
Posted: 4 Min Read

Disrupting the Attack Chain Through Detecting Credential Dumping

Credential dumping is an essential step in the attack chain. Symantec’s defense-in-depth portfolio detects and blocks credential dumping and associated attack events.

Disrupting the Attack Chain Through Detecting Credential Dumping
Ratheesh PMSr Threat Analysis Engineer
Posted: 20 Min Read

Microsoft Patch Tuesday – March 2019

This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.

Microsoft Patch Tuesday – March 2019
Security Response Attack Investigation Team
Posted: 4 Min Read

Whitefly: Espionage Group has Singapore in Its Sights

Group behind the SingHealth breach is also responsible for a string of other attacks in the region.

Whitefly: Espionage Group has Singapore in Its Sights
Yuanjing GuoAssociate Software Engineer
Posted: 3 Min Read

Several Cryptojacking Apps Found on Microsoft Store

Symantec found eight apps on Microsoft's app store that mine Monero without the user's knowledge.

Several Cryptojacking Apps Found on Microsoft Store
View More