Blog

The Hasty Agent: Agent Tesla Attack Uses Hastebin

October 29, 2020

Earlier this week, we stumbled across a new malware sample in one of our production sites, that caught our attention. During our analysis, we came to

All Aboard the COVID-19 Train:

October 25, 2020

Since the outbreak of COVID-19, plenty of COVID-19 themed malware attacks have surfaced around the globe. Attackers take every chance they get to spre

Why Emotet’s Latest Wave is Harder to Catch than Ever Before - Part 2

October 12, 2020

Emotet, the largest malware botnet today, started in 2014 and continues to be one of the most challenging threats in today’s landscape. This botnet ca

Why Emotet's Latest Wave is Harder to Catch than Ever Before

August 12, 2020

After five months of inactivity, the prolific and well-known Emotet botnet re-emerged on July 17th. The purpose of this botnet is to steal sensitive i

Everybody Wins! Deep Instinct Achieves SOC2 Type II Certification

August 11, 2020

What is a SOC2 Type II audit? Service Organization Control 2 is an industry-leading reporting standard, defined by the American Institute of Certifie

How to Defend Against Advanced Persistent Threats

August 9, 2020

Advanced Persistent Threats (APTs) are targeted cyberattacks that persist for an extended period. During this type of attack, intruders access the net

Schools on Red Alert After FBI Issues Cybersecurity Warning

August 6, 2020

The FBI has released a public service announcement that K-12 schools should expect a surge of cyberattacks, particularly ransomware infections, during

Mobile Security and why I Hate BYOD Policies

August 2, 2020

Mobile security has become a hot topic as of late, because of the increased number of people who are using their mobile devices (often, personal devic

Let Deep Instinct Train Your Brain

July 26, 2020

After achieving fame and success for training artificial neural networks, Deep Instinct is now looking to train new brains, namely, YOURS! Not near

How Your Regular Microsoft Office file is Open to Manipulation

July 14, 2020

Microsoft Office is one of the most common attack vectors used by malicious actors to spread their malware. Considering that most computers have Micro