Perimeter
8/5/2014
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

6Scan Announces Automated Malware Quarantine for Websites

New protection works at the web application layer to respond in real time to emerging malware threats

[San Francisco]—August 5, 2014—6Scan  (www.6Scan.com), a leading provider of automated website security services for small businesses, announced today that it is adding Automated Malware Quarantine, a patent-pending real-time malware detection-and-response technology, to its suite of website scanning, vulnerability repair and malware remediation solutions. This new technology effectively automates malware protection, securing websites from emerging threats as soon as they appear.

Malware a significant threat to small business websites

The ability to detect and immediately react to web-based malware is critical as small businesses are targeted by increasingly sophisticated attacks.  Microsoft, in an attempt to stem the rampant distribution of web-based malware, recently seized control of 5 million subdomains that were using Dynamic DNS service No-ip.com. Dynamic DNS, often combined with advanced cloaking techniques, is used by sophisticated hackers to conceal their attacks.  These techniques make it imperative to quickly on the first pass, before it goes into stealth mode and re-emerges later.

“As threats to small businesses become more advanced solutions need to keep pace” explains 6Scan CEO Chris Weltzien. “And for small businesses, with limited resources and few, if any, dedicated IT security staff, it’s critical that these solutions are proactive and automated. With our latest release, 6Scan makes powerful real-time protection available to business and organizations of all sizes, regardless of their internal IT resources.”

The upward trend of small businesses managing their own websites amplifies this need. The National Small Business Association 2013 Technology Survey found that 66% of small businesses maintain their own websites, up 15% from the 2010 report.   Meanwhile the report indicates that 64% of companies consider maintain the site “a major challenge.”

Protection that’s faster than hackers

85% of malicious links are hosted on hacked legitimate websites, according to industry research, and small businesses bear the brunt of these attacks. Smaller sites are often targeted because they have few security resources available. Once they have been hacked and infected with website viruses, these small business run the risk of distributing malware to their customers and even being blacklisted—effectively disappearing from search engines and popular browsers.

6Scan’s comes to the rescue of small businesses with Automated Malware Quarantine, the industry’s first real-time malware solution that works automatically on the web application layer. This new approach dramatically reduces the risk window between infection and removal. Automated Malware Quarantine is available to 6Scan customers today as part of its Professional and Enterprise security suite offerings.

About 6Scan

Headquartered in Tel Aviv’s booming technology startup district, 6Scan’s mission is to reverse the rising trend of successful website hacks, making the Internet a safer place for website owners as well as for users. As more and more websites use 6Scan’s one-click, always-updated protection, hackers will have less and less surface area to perform their attacks.

###

For more information, press only:

[email protected]

For more information on Automated Malware Quarantine and the 6Scan suite:

www.6scan.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Why Hackers Are in Such High Demand, and How They're Affecting Business Culture
Jaime Blasco, Vice President and Chief Scientist at AlienVault,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Santa: "How about a unicorn coming out of a monitor instead?"
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.