Our latest newsletter illustrates just how powerful the Cloud has become in the global business community. It is no longer a question whether a business should utilize the Cloud, those days are over…
Now we are calculating how much money an organization will save. Teknas is in the forefront of building new Cloud solutions and pushing the boundaries. Our goal is simple — ensure that our clients are safe and secure and prospering every day. Read more “20% Growth with the Cloud”
Securolytics offers multiple integrated security services. Recently we extended our portfolio with a new advanced add-on to our Web Security called- Advanced Threat Defense.
This service allows us to detect and stop zero-day exploits and Advanced Persistent Threats (APTs) while users are surfing the Internet through our cloud infrastructure.
Read more “Inside Securolytics Advanced Threat Defense”
At Securolytics we recently discovered a new wave of social engineering attacks through email. The messages were being sent with a malicious PDF document attached. The email subject was- Read more “Attacking Through Social Engineering”
The Internet Content Adaptation Protocol was first proposed in 1999, however it’s perhaps one of the lesser known protocols on the Internet.
ICAP is defined in RFC 3507 whose basic premise is to provide sideband content filtering/modification of HTTP requests. It would normally be used in conjunction with a web proxy/cache. Its most common use would perhaps be to provide virus scanning of web content before being passed onto the user. Read more “An ICAP Primer”
In September 2015, cybercriminals stole 10 million personal records from Excellus BlueCross BlueShield. Get a behind the scene look at how these criminals infiltrated Excellus and walked out the front door with PHI. Read more “Inside the Excellus Breach”
The Advanced Threat Defense engine in Securolytics Web Security recently detected and blocked downloads of an executable file that we found very interesting. The blocked file was the installer for a program called ReimagePlus. We thought it would be useful to provide some analysis of this program to illustrate how Securolytics Web Filtering is able to protect our customers from having potentially problematic programs introduced into their systems. Read more “Removing ReimagePlus Adware”
On October 07, 2015 our platform monitoring systems detected a new wave of spam emails with malicious doc files. The decoy, which purported to be an Amazon invoice, was directly attached to an email targeting small businesses. The originator field was firstname.lastname@example.org and each email had an attachment with name like amazon_invoice.doc. Read more “Amazon Zero Day Exploit”