What is Venus Ransomware? Venus is a ransomware discovered by a malware researcher called S!Ri. Its primary function is file and system encryption, all affected files are modified with a .venus extension as shown in the figure below. After encrypting all the data, the desktop wallpaper is replaced with a [...]
Recently, Nucleon Security was featured as one of the best endpoint protection solution providers! For that, we want to thank Cybernews Team - an online resource packed with breaking news, product reviews, exclusive interviews, and tips. You can check the endpoint protection top picks here or the best VPN for [...]
The offer of cybersecurity solutions and in particular endpoint protection is increasingly abundant. Each publisher offers new approaches according to its vision of actual trending threat. These solutions are then categorized by analyst firms such as Gartner, Forrester or KuppingerCole. It is increasingly difficult to judge the relevance of a [...]
Machine Learning and Multi-Layer Zero Trust, the winning combo for an efficient EDR. You’re maybe searching for your EDR (Endpoint Detection and Response). During the research of the perfect data and endpoints protection software, you may read a lot of scientific and abstract terms. In this article, we’ll uncover information ...
Malware developers are always looking for new technics to bypass security systems. In this article we will see how Windows Installer can be abused to deliver malicious code, and how the famous ransomware Maze uses this type of technic. Create malicious MSI files An MSI file is a compressed database ...
Ransomwares are still the most widespread cyberattacks targeting corporate data. That’s why in addition of the Multi-Layer Zero-Trust implementation in Nucleon Smart Endpoint EDR, we now release new post-exploitation features. In this article we will demonstrate our rollback and remediation features against Hakbit ransomware. The goal is to reduce the ...
What are Living off the land or Filleless attacks and why is it a real Cybersecurity issue? The different appellations Targeted and non-targeted cyberattacks use different operating methods to achieve their ends. Among these operating modes we find attacks without files. These can have several names: fileless attacks zero-footprint attacks non-malware attacks [...]
What are the new cybersecurity challenges facing manufacturers and how to mitigate the risks? Until today, manufacturers had two different IT work plans. The “classic” computer network, with servers and workstations connected to the Internet; and the production computer network, more isolated with equipment specific to industrial systems, machines rarely [...]
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Les cookies nécessaires sont absolument indispensables au bon fonctionnement du site web. Cette catégorie ne comprend que les cookies qui garantissent les fonctionnalités de base et les caractéristiques de sécurité du site web. Ces cookies ne stockent aucune information personnelle.
Tous les cookies qui ne sont pas particulièrement nécessaires au fonctionnement du site web et qui sont utilisés spécifiquement pour collecter des données personnelles sur les utilisateurs par le biais d'analyses, de publicités et d'autres contenus intégrés sont qualifiés de cookies non nécessaires. Il est obligatoire d'obtenir le consentement de l'utilisateur avant d'utiliser ces cookies sur votre site web.