Why the Meltdown/Spectre Vulnerabilities are Important to You
Two distinct vulnerabilities dubbed Meltdown and Spectre potentially affect almost every system1. In a world that is already saturated with cyberattacks and vulnerabilities, it is easy to succumb to cyber threat fatigue when discussing two new outbreaks. Even though there have been no confirmed reports of attacks that have taken advantage of these newly exposed vulnerabilities, they are highly (more…)
2016 PROVED A DARK YEAR FOR CYBER ATTACKS ON HEALTHCARE ORGANIZATIONS
A DARK YEAR FOR CYBER ATTACKS ON HEALTHCARE ORGANIZATIONS. The famous American criminal Willie Sutton was asked once why he robbed banks, to which he is reported to have answered, “Because that’s where the money is”. In similar fashion, cyber criminals such as a hacker group that calls itself “TheDarkOverLord” could be asked why they continued to breach a series (more…)
RANSOMWARE IS THE NEW MULTI-LEVEL MARKETING BUSINESS
2016 has proven to be a banner year for Ransomware. The year kicked off with a series of ransomware attacks on a trio of hospitals including the well-publicized incident at Hollywood Presbyterian Medical Center which forced its IT staff to shut down the network while coerced administration officials agreed to pay (more…)
IoT DEVICES MAKE IDEAL SOLDIERS FOR CYBER CRIMINALS
We all remember gazing in wonder at the armies of elite empirical storm troopers as they collectively marched into battle to subdue the rebel forces in those early Star Wars movies. Many of us recall the machines spotlighted in the Terminator series which led the battle against the humans. Science (more…)
DEMYSTIFYING COMPROMISE ASSESSMENTS
As threat technology rapidly advances, hackers and threat actors leverage all the means at their disposal to deliver malware and compromise your systems and information. To expose these threat actors, a lot of organizations rely heavily on experts in the cyber security field to perform penetration tests and compromise assessments. (more…)
RANSOMWARE: CURRENT STRAINS, ATTACK VECTORS AND PROTECTION
Staying ahead of security threats is no easy task. One threat that should definitely be on your radar is ransomware. From hospital heists to attacks on schools and other businesses, ransomware is costly and is projected to be one of the biggest threats in 2016. According (more…)
ENDPOINT DETECTION AND RESPONSE: FIRE FOR EFFECT
The modern digital landscape is a battleground rife with adversaries ready and willing to go to great lengths to steal your data. Clever independent attackers and state-sponsored actors alike are deploying increasingly effective versions of cyber attacks intended to intrude, infect, steal, evade, disrupt and destroy everything they touch. To defend themselves, many businesses are investing in a variety of technologies and techniques (more…)
In the Wake of Backdoor.Regin: Accounting for the State Sponsored Threat
Recently the Symantec Corporation uncovered a highly sophisticated, modular piece of malware that has been infecting computers in a variety of countries as far back as 2008 – Backdoor.regin has characteristics beyond those of modern malware and is already generally accepted as a product of nation-state cyber espionage. The implant likely took considerable resources and time to create and has several (more…)
All Done with Shellshock? Get Ready for the Next One.
Why read another article on the Shellshock bug when there have been a number of well-written articles and blog posts on it? Because almost all of the articles and blogs are talking about the bug itself, how it can be exploited, and how much of the Internet is open to it. However, what you should really be interested in (more…)
Cyber-Espionage: Every Business is a Target
For those of us in the world of information security, the news of Attorney General Eric Holder bringing a first-of-its-kind criminal cyber espionage case against Chinese military officials is no surprise at all. For years, the Chinese have been known for launching cyber attacks on American (more…)