Centrify Named a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management
At Centrify we are proud of our customers and the success they experience with our solutions. Today we are proud that our customers are speaking out and providing valuable insights to the market about their experience with Centrify.
This morning, Gartner announced that Centrify has been recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management.
In...
Now-Patched Google Photos Vulnerability Let Hackers Track Your Friends and Location History
A now-patched vulnerability in the web version of Google Photos allowed malicious websites to expose where, when, and with whom your photos were taken.
Background
One trillion photos were taken in 2018. With image quality and file size increasing, it’s obvious why more and more people choose to host their photos on services like iCloud, Dropbox and Google Photos.
One of the...
How Our Threat Analytics Multi-Region Data Lake on AWS Stores More, Slashes Costs
Data is the lifeblood of digital businesses, and a key competitive advantage. The question is: how can you store your data cost-efficiently, access it quickly, while abiding by privacy laws?
At Imperva, we wanted to store our data for long-term access. Databases would’ve cost too much in disk and memory, especially since we didn’t know much it would grow, how...
The fourth horseman: CVE-2019-0797 vulnerability
In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in win32k.sys. We reported it to Microsoft on February 22, 2019. The company confirmed the vulnerability and assigned it CVE-2019-0797. Microsoft have just released a...
Cybersecurity Skills Gap Survey 2019
Cybersecurity Skills Gap Survey 2019 #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{ width:100%; } .ExternalClass{ width:100%; } body{ -webkit-text-size-adjust:none; } body{ margin:0; padding:0; } img{ border:0; height:auto; line-height:100%; outline:none; text-decoration:none; } table td{ border-collapse:collapse; } #backgroundTable{ height:100% !important; margin:0; padding:0; width:100% !important; } body,#backgroundTable{ background-color:#ffffff;...
Spam and phishing in 2018
Numbers of the year
The share of spam in mail traffic was 52.48%, which is 4.15 p.p. less than in 2017.
The biggest source of spam this year was China (11.69%).
74.15% of spam emails were less than 2 KB in size.
Malicious spam was detected most commonly with the Win32.CVE-2017-11882 verdict.
The Anti-Phishing system was triggered 482,465,211 times.
18.32% of unique users encountered phishing.
Global...
A predatory tale: Who’s afraid of the thief?
In mid-February, Kaspersky Lab received a request for incident response from one of its clients. The individual who initially reported the issue to our client refused to disclose the origin of the indicator that they shared. What we do know is that it was a screenshot from one of the client’s internal computers taken on February 11 while an...



![FW: [Correction] VERT Threat Alert](https://www.dataproof.co.za/wp-content/uploads/2019/03/fw-correction-vert-threat-alert.png)









