Archive

Archive

A Song of Phishing and Passwords via Cylance

Phishing for Developers Hackers are targeting Chrome extension developers with phishing attacks to hijack control over their extensions in the Chrome Webstore. The phishing attacks are very well crafted to display a replica of the real Google login page and use new ... »

Ten Practical Steps to Protect Your Online Privacy via Cylance

Two things happened recently which should raise an alarm for anyone concerned about their online privacy. The first was a major release by WikiLeaks on March 7, 2017 of a trove of hacks and hacking techniques allegedly employed by the CIA ... »

Defending Against El Machete’s Malware Attacks with Cylance

Can You Protect Against El Machete? El Machete is a targeted attack campaign that was first publicly disclosed and named by Kaspersky here. The Cylance SPEAR™ Team, whilst tracking and monitoring threats, found that El Machete has continued to operate ... »

When Robots Go Rogue – Cylance Identifies What’s Real in AI

Westworld… J.A.R.V.I.S.… Knight Rider… seems like we’ve been surrounded by artificial intelligence (AI) for a long time, doesn’t it? Thanks to Cylance we’re able to make sense of and understand exactly what Artifical Intelligence and Machine Learning really are. As other ... »

Begin With the End(point) in Mind

Advances in artificial intelligence (AI), machine learning (ML), and mathematical algorithms have allowed cyber security professionals to bolster their threat prevention in recent years. SecOps groups have shifted focus from response to prevention, using AI/ML-powered protection products such as CylancePROTECT® to ... »