29 Posts

Etay Maor

Executive Security Advisor, IBM Security

Etay Maor is an Executive Security Advisor at IBM Security, where he leads security and fraud fighting awareness and research. A security evangelist, Etay regularly presents at industry events, including RSA USA, RSA Asia, RSA Europe, FS-ISAC and GovWare Singapore, and he also volunteers for educational security awareness programs. In 2015 Etay was honored to be chosen as one of 17 "IBM Rockstar Employees" by Business Insider. Previously, Etay was the Head of RSA’s Cyber Threats Research Labs.

Written By Etay Maor

‘Tis the Season for Increased Cybersecurity Vigilance

Cybersecurity vigilance is crucial during the holiday shopping season, but it's equally important to carry that security awareness into the new year.

Diagnosing the Details of a Malware Infection

As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.

Building a Cyberattack: Social Engineering, Zero-Day Vulnerabilities and More

Many cybercriminals today use social engineering as a means of carrying out attacks. In fact, this method is among the most popular attack types.

Cybercrime Ecosystem: Everything Is for Sale

The current cybercrime ecosystem puts resources at the fingertips of criminals, making it easier to carry out more extensive or sophisticated attacks.

Taking Evasive Actions Against Cyberfraud

Cybercriminals are investing time and effort to improve their cyberfraud techniques in order to evade detection by security researchers and solutions.

The Darknet Isn’t Just for Dark Deals

When discussing the darknet, the focus has shifted from its use as infrastructure for malware communication to the hidden services it offers.

Fraud Risk Engines: The Statistics Are Not in Your Favor

The following is a look into how authentication risk engines are designed and the root cause for their failure in detecting today's cybercriminals.

How to Bypass Two-Factor Authentication (2FA) and What the Future Holds

Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).

New Variant of Bugat Malware Borrows Lucrative Gameover Zeus Techniques

A new Bugat malware variant is using techniques similar to the Gameover Zeus HTML injections to target banking applications and steal user credentials.

Citadel’s New Trick: Persistent Device Remote Control

Citadel, a type of malware, can now persistently have remote control of devices, which is an advanced threat that can affect many victims.