Ransomware Command and Control Detection using Machine Learning

Ransomware Command and Control Detection using Machine Learning

Authors: Deepak Gujraniya, Mohammad Waseem, Balamurali AR, and Satnam Singh Since the first attack in 1989 [1], ransomware attacks have gained popularity. Especially in 2017, it has created havoc in every possible industry, including the government offices,...
Beyond the Hype: AI in Information Security

Beyond the Hype: AI in Information Security

In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce...
Lateral Movement of Emotet

Lateral Movement of Emotet

Acalvio Threat Research Labs. Introduction Emotet is one of many information stealer malware families which have been active in the recent months. The initial delivery vector of the malware is via phishing campaign. The blog by TrendMicro[1] and Microsoft[2] discusses...
CSO Magazine Names ShadowPlex One of Best Security Products

CSO Magazine Names ShadowPlex One of Best Security Products

CSO Magazine has named Acalvio’s ShadowPlex as one of the best security products of the year. CSO specifically cites Acalvio’s ease of use and “unlimited deception assets without constant overhead or maintenance” as value added features. You...