article thumbnail

BlackBerry partners with Intel to detect cryptojacking malware

Tech Republic Security

The partnership leverages Intel's CPU telemetry data to more easily detect abnormal system behavior that indicates illicit cryptocurrency mining.

Intel 546
article thumbnail

Fortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat Alliance

CTOvision

It’s no longer enough to share and compare yesterday’s malware samples. ” – Vincent Weafer , senior vice president for McAfee Labs, part of Intel Security. ” – Vincent Weafer , senior vice president for McAfee Labs, part of Intel Security. Fortinet (NASDAQ: FTNT ). Palo Alto Networks (NYSE: PANW ).

Symantec 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers publish MSI private keys, enabling signed malware

TechSpot

Security researchers have confirmed that private keys for MSI products and Intel Boot Guard are loose in the wild. Hackers could use the keys to sign malware under the guise of official MSI firmware. Intel Boot Guard is a critical security check for when computers first start up, and the. Read Entire Article

Malware 140
article thumbnail

Sophisticated hackers snuck sleeper malware into nearly 30,000 Macs

The Verge

There’s a popular stereotype that Apple’s computers are largely immune to malware. It was literally just one week ago that Objective-See security researcher Patrick Wardle published a story about the first piece of malware discovered in the wild targeting Apple Silicon, and now we have two. Red Canary (@redcanary) February 19, 2021.

Malware 145
article thumbnail

What AI already does well in supply chain management

CIO Business Intelligence

Inspection Another example of how AI is being used can be found at Intel, where several chips are printed on a single wafer using lithography. Intel has a quality threshold against which chips are measured to determine whether they should be kept or thrown out. “We

Intel 345
article thumbnail

Fileless Powershell malware uses DNS as covert communication channel

Network World

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored. When opened, the file masquerades as a "protected document" secured by McAfee, an antivirus brand now owned by Intel Security.

Malware 150
article thumbnail

From the trenches: A CISO’s guide to threat intelligence

Network World

That’s where threat intelligence comes in – it’s the intel that fuels our defenses, and the night-vision goggles to see the dark and precarious battlefield clearly (or at the least a little better). This intel helps us understand attacker tactics, techniques, and procedures (TTPs). The same is true with threat intel.

Intel 354