{"id":82838,"date":"2023-05-22T06:11:25","date_gmt":"2023-05-22T06:11:25","guid":{"rendered":"https:\/\/x-phy.com\/?p=82838"},"modified":"2025-11-11T09:47:02","modified_gmt":"2025-11-11T09:47:02","slug":"security-experts-weigh-in-on-snake-malware-operation","status":"publish","type":"post","link":"https:\/\/x-phy.com\/security-experts-weigh-in-on-snake-malware-operation\/","title":{"rendered":"Security experts weigh in on Snake malware operation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82838\" class=\"elementor elementor-82838\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50029409 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50029409\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7213e613\" data-id=\"7213e613\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-405b7203 elementor-widget elementor-widget-text-editor\" data-id=\"405b7203\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Snake malware lay undetected in organisations in over 50 countries, stealing sensitive data and documents from NATO member governments, journalists and other targets of interest. \\n\\nOur CEO Camellia Chan shared,\\&quot;Traditional cybersecurity solutions are built for protection at the external layers, but such a vast landscape leaves too many gaps for cybercriminals to penetrate. Threat actors are multiple steps ahead and continue to evolve their tech and business models to bypass software defenses. Therefore, software security solutions find it difficult to identify newly modified threats and confidential data remains at risk. Organizations need to think outside the box \u2013 enter firmware level protection, a way to take cybersecurity to the next level.\\&quot;\\n\\nRead what Camellia and other industry experts had to say about this alarming reality in this article by Security Magazine: https:\/\/www.securitymagazine.com\/articles\/99381-security-experts-weigh-in-on-snake-malware-operation\\n\\nContact us to learn more about how our solutions can protect you against similar attacks. [Hyperlink \\&quot;contact us\\&quot; to a contact form, or email?]&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1315753,&quot;3&quot;:{&quot;1&quot;:0},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;15&quot;:&quot;Arial&quot;,&quot;21&quot;:0,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:880,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:980}\uee10{&quot;1&quot;:1071,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:9961472}}}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:880,&quot;2&quot;:&quot;https:\/\/www.securitymagazine.com\/articles\/99381-security-experts-weigh-in-on-snake-malware-operation&quot;}\uee10{&quot;1&quot;:980}\">Snake malware lay undetected in organisations in over 50 countries, stealing sensitive data and documents from NATO member governments, journalists and other targets of interest.<\/span><\/p><p>Our CEO Camellia Chan shared,&#8221;Traditional <a href=\"https:\/\/x-phy.com\/\">cybersecurity solutions<\/a> are built for protection at the external layers, but such a vast landscape leaves too many gaps for cybercriminals to penetrate. Threat actors are multiple steps ahead and continue to evolve their tech and business models to bypass software defenses. Therefore, software security solutions find it difficult to identify newly modified threats and confidential data remains at risk. Organizations need to think outside the box \u2013 enter\u00a0<a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\" target=\"_blank\" rel=\"noopener\">advanced malware protection<\/a>, a way to take cybersecurity to the next level.&#8221;<\/p><p>Read what Camellia and other industry experts had to say about this alarming reality in this article by Security Magazine: <a class=\"in-cell-link\" href=\"https:\/\/www.securitymagazine.com\/articles\/99381-security-experts-weigh-in-on-snake-malware-operation\" target=\"_blank\" rel=\"noopener\">https:\/\/www.securitymagazine.com\/articles\/99381-security-experts-weigh-in-on-snake-malware-operation<\/a><\/p><p><a href=\"https:\/\/x-phy.com\/support\/\">Contact us<\/a> to learn more about how our solutions can protect you against similar attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d772499 elementor-widget elementor-widget-html\" data-id=\"d772499\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n   <span style=\"color:#000000;font-weight:bold;\">TAGS<br\/><br\/><\/span> \n<\/div>\n<div>\n    <span class=\"tag_style\">Security Incidents<\/span>\n    <span class=\"tag_style\">Industry News<\/span>\n    <span class=\"tag_style\">Media Coverage<\/span>\n<\/div>\n\n\n<style>\n    .tag_style{\n        color:#000000;\n        border:solid 1px #C7C7C7;\n        padding: 5px;\n        margin:5px;\n    }\n    \n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Snake malware lay undetected in organisations in over 50 countries, stealing sensitive data and documents from NATO member governments, journalists and other targets of interest. Our CEO Camellia Chan shared,&#8221;Traditional [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":82839,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[14],"tags":[],"class_list":["post-82838","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-media"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/82838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=82838"}],"version-history":[{"count":1,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/82838\/revisions"}],"predecessor-version":[{"id":110084,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/82838\/revisions\/110084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/82839"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=82838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=82838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=82838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}