What You Need to Know About LookBack Malware & How to Detect It

What You Need to Know About LookBack Malware & How to Detect It

On August 1, security researchers at Proofpoint reported the details of spearphishing campaign targeting three different United States utility companies using a malware called “LookBack.” The spearphishing emails contained a malicious Microsoft Word attachment that installed a Remote Access Trojan (RAT) capable of performing activities like deleting files, taking screenshots, rebooting machines, and then deleting itself from an infected network.

Learn more about LookBack malware and how you can detect it.

What’s New in Nozomi Networks v19.0 ICS Security Solution

What’s New in Nozomi Networks v19.0 ICS Security Solution

With cyberattacks on industrial systems making headlines around the world, it’s important to find new ways to improve cyber security and bridge the gap between IT, OT, and IoT. Nozomi Networks v19.0 focuses on expanding and improving security visibility with new features such as an appliance for monitoring remote locations, integrations with Cisco & Aruba, new built-in compliance reports, some powerful query & reporting enhancements, and more…