Many successful ransomware/other malware attacks share two characteristics. One is that they gain access to an enterprise network because a legitimate, authorized user does something they shouldn’t. Such as opening a phishing email, clicking on a bogus web link, or …Read more
With ransomware exploding, we’re frequently asked how to remediate after an attack.
Ransomware is becoming more common and bad guys are becoming more sophisticated, using innovative ways to evade the latest detection techniques. Can you trust your AV (gen1 or …Read more
Targeted threats (also known as Advanced Persistent Threats, or APTs) are more of a methodology than a piece of malware, and they follow a fairly well-defined framework.
Regardless of the groups that are behind these targeted attacks, their exploitation techniques …Read more
There’s an old saying that goes like this: “The doors of history turn on small hinges.” So do our lives as human beings. So does the longevity of a business.
Those “hinges” are the choices we make—the decisions that direct …Read more
“The first six months of 2017 have seen an evolution of ransomware producing more viral variants unleashed by potential state-sponsored actors and cybercriminals. Our findings confirm that a new bar has been set for cybersecurity teams across all industries to …Read more