|By Business Wire||
|April 29, 2014 06:35 AM EDT||
Arbor Networks, Inc., a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, announced today that it will host a Webinar that explores the ongoing Point-of-Sale malware campaign that has targeted retailers this winter and continues today. This webinar, “More than one target: Point-of-Sale malware campaigns continue,” will take place on April 29, 2014 at 11:00am ET.
As additional details on the Target breach - and other retail attacks - leak out, we see that Point-of-Sale (POS) malware continues to be a significant threat. There are several attack methodologies at play and many forms of new malware, including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer and others. All continue to compromise organizations large and small. These are all part of an ongoing malware campaign that the Arbor Security Engineering and Response Team (ASERT) has tracked extensively, reporting on it in December 2013 on the ASERT blog: http://www.arbornetworks.com/asert/2014/03/dexter-and-project-hook-point-of-sale-malware-activity-update/
In this Webinar, Curt Wilson, senior research analyst for Arbor's Security Engineering and Response Team, will explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise. Additionally, this talk will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser-known POS malware threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including eCommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.
Join this Webinar to learn about:
- The various types of POS malware threats and the implications of experiencing an attack
- The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks
- Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
Curt Wilson, Senior Research Analyst for Arbor's Security Engineering and Response Team (ASERT)
Jennifer Glenn, Product Marketing – Enterprise Security, Arbor Networks
WHAT: Live Webinar: “More than One Target: Point-of-Sale
Malware Campaigns Continue”
WHEN: April 29, 2014 | 11:00am ET
WHERE: Register here
About Arbor Networks
Arbor Networks, Inc. helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business.
To learn more about Arbor products and services, please visit our website at arbornetworks.com. Arbor’s research, analysis and insight, together with data from the ATLAS® global threat intelligence system, can be found at the ATLAS Threat Portal.
Trademark Notice: Arbor Networks, Peakflow, ArbOS, ATLAS, Pravail, Arbor Cloud, Cloud Signaling, the Arbor Networks logo and Arbor Networks: Smart. Available. Secure. are all trademarks of Arbor Networks, Inc. All other brand names may be trademarks of their respective owners.
Sep. 27, 2016 03:00 PM EDT Reads: 1,684
Sep. 27, 2016 02:45 PM EDT Reads: 1,246
Sep. 27, 2016 02:45 PM EDT Reads: 2,193
Sep. 27, 2016 02:45 PM EDT Reads: 4,597
Sep. 27, 2016 02:30 PM EDT Reads: 286
Sep. 27, 2016 02:15 PM EDT Reads: 1,974
Sep. 27, 2016 02:00 PM EDT Reads: 1,438
Sep. 27, 2016 01:45 PM EDT Reads: 222
Sep. 27, 2016 01:30 PM EDT Reads: 1,711
Sep. 27, 2016 01:15 PM EDT Reads: 2,745
Sep. 27, 2016 01:00 PM EDT Reads: 2,657
Sep. 27, 2016 01:00 PM EDT Reads: 1,594
Sep. 27, 2016 01:00 PM EDT Reads: 2,810
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Sep. 27, 2016 12:30 PM EDT Reads: 2,354
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 27, 2016 12:30 PM EDT Reads: 1,755