zero day blog
30 Mar 2020 • Yiftach Keshet

Half of the Malware Detected in 2019 was Classified as Zero-Day Threats, Making it the Most Common Malware to Date

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

30 Mar 2020 • Yiftach Keshet

Half of the Malware Detected in 2019 was Classified as Zero-Day Threats, Making it the Most Common Malware to Date

zero day blog

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

corona
15 Mar 2020 • Yiftach Keshet

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity - Acting as a Warning for CISOs Worldwide

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

15 Mar 2020 • Yiftach Keshet

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity - Acting as a Warning for CISOs Worldwide

corona

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

APT Header
13 Feb 2020 • Yiftach Keshet

Warning Signs That You May Be Under an APT Attack

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

13 Feb 2020 • Yiftach Keshet

Warning Signs That You May Be Under an APT Attack

APT Header

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

2
15 Sep 2019 • Yiftach Keshet

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

15 Sep 2019 • Yiftach Keshet

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond

2

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

1small
29 Aug 2019 • Yiftach Keshet

A Guide to Rootkit Detection: History, Methods and More

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

29 Aug 2019 • Yiftach Keshet

A Guide to Rootkit Detection: History, Methods and More

1small

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

banner2
22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

banner2

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

vulnerability-sq
27 May 2019 • Yiftach Keshet

The Easiest Threat Prevention - Streamlining Software Vulnerability Management

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

27 May 2019 • Yiftach Keshet

The Easiest Threat Prevention - Streamlining Software Vulnerability Management

vulnerability-sq

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

fb-image1
13 Dec 2016 • Eyal Gruner

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

13 Dec 2016 • Eyal Gruner

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers

fb-image1

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

lgg3
28 Jan 2016 • Eyal Gruner

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

28 Jan 2016 • Eyal Gruner

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack

lgg3

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

fire4
13 Jan 2016 • Netanel Amar

Vendors Say Not Worried About FireStorm

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

13 Jan 2016 • Netanel Amar

Vendors Say Not Worried About FireStorm

fire4

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

NGFWs post pic1
09 Dec 2015 • Netanel Amar

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]

09 Dec 2015 • Netanel Amar

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls

NGFWs post pic1

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into every aspect of our casual […]