Top
item
Advertisement

Tag: Analysis


Hacker, Threats & Malware

Analysis Shows Attackers Favor PowerShell, File Obfuscation

December 14, 2022

Via: Dark Reading

An analysis of threats encountered by four organizations has identified the most common techniques used by attackers to compromise systems, infiltrate networks, and steal data, according to data analysts at Splunk, which published details of the research on Dec. 14. […]


Network security

Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts

November 8, 2017

Via: Security Intelligence

When it comes to securing their environments, IT professionals have a critical decision to make: Should they wait until after malicious actors strike to react to security incidents, or should they address threats proactively to stop attacks before they happen? […]


Data loss

New Yorkers See 60% Rise in Data Breaches in 2016

March 23, 2017

Via: Dark Reading

An analysis conducted by the New York Attorney General’s (AG) office reveals a 60% increase in data breaches in New York in 2016. This resulted in 1.6 million personal records exposed, three times the amount exposed in 2015. Main causes […]


Cloud security

Incident report on Cloudflare parser bug

February 28, 2017

Via: The Hacker News

Cloudflare reported last night a bug in their service which could have leaked information from the services using their edge cache servers. Feedly uses Cloudflare as a security shield which increases the reliability and performance of the Feedly web application. As […]


Access control

$3.2 Million HIPAA Fine: An Analysis

February 3, 2017

Via: DataBreach Today

Federal HIPAA enforcers smacked a Texas pediatric hospital with a whopping $3.2 million civil monetary penalty after investigating breaches involving unencrypted mobile devices and uncovering longstanding failures to comply with HIPAA. In a Feb. 1 statement, the Department of Health […]


Malware

Locky Bart ransomware and backend server analysis

February 1, 2017

Via: Malwarebytes

In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware campaigns running called “Locky” and “Locky v2”. After some users reported being infected with Locky Bart, we investigated it […]


Malware

Zbot with legitimate applications on board

January 30, 2017

Via: Mawarebytes

Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with their own ideas. Recently, among the payloads delivered by exploit kits, we often find Terdot.A/Zloader – a downloader installing […]


Malware

VirLocker’s comeback; including recovery instructions

January 26, 2017

Via: Malwarebytes

VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now. VirLocker was the first example of a mainstream polymorphic ransomware and it left no expense of misery to its […]


Network security

Can your SEO rankings be lowered by a DDoS Attack?

January 25, 2017

Via: Radware Blog

Last week, I was doing research in the DarkNet marketplaces to keep on top of the current trends in the threat landscape. One of the advertisements that struck me as typical was an advertisement for a DDoS botnet for rent. […]


Vulnerabilities

Ransomware: How A Security Inconvenience Became The Industry’s Most-Feared Vulnerability

January 17, 2017

Via: Dark Reading

There are all sorts of ways to curb ransomware, so why has it spread so successfully? The word “ransomware” conjures up images of dark cloaks and even darker alleys, and not surprisingly, the level of media attention has been unprecedented. […]


Cyber warfare

BrandPost: Cybercrime, Not an Act of War

January 11, 2017

Via: CSO Online

Sometimes, when a network is breached, when servers are compromised, or when unencrypted data is at risk, companies will get, or even seek, assistance from government offices. The nature of cybercrime points to the ways in which our digital architectures […]


Malware

The curious case of a Sundown EK variant dropping a Cryptocurrency Miner

January 9, 2017

Via: Malwarebytes

We recently encountered an atypical case of Sundown EK in the wild – usually the landing page is obfuscated, but in this case there was plain JavaScript. The exploit was dropping some malicious payloads that we took for further analysis. It turned […]


Privacy protection

Are Unconscious Biases Weakening Your Security Posture?

December 16, 2016

Via: Dark Reading

As we move from one year to the next, it is valuable to reflect on what has changed and what hasn’t in our areas of interest. In cybersecurity, there are two notable things that have not changed over the past […]


Malware

PrincessLocker – ransomware with not so royal encryption

November 22, 2016

Via: Malwarebytes

PrincessLocker ransomware has appeared some time ago and has drawn out attention by using the same template of the site for a victim as Cerber did. It is not a widespread ransomware, so it has taken some time before we […]


Privacy protection

Donald Trump will control the NSA – what this means for your privacy

November 14, 2016

Via: Security Affairs

Regardless of which side of the political spectrum you are on, Trump’s control over the NSA is now an indisputable fact, and we think it is worth taking a closer look at what this means. It is important to note […]


Cyber warfare, Cyber-crime

Boffins analyzed EXIF metadata in photos on principal blackmarkets

September 20, 2016

Via: Security Affairs

Darknets are a privileged environment for crooks that intend to develop a prolific business protecting their anonymity, anyway, there are several aspects that they need to consider in order to leave tracks that could allow their identification. In the past […]


Access control

The Trump Security Platform: Maintaining the GOP Status Quo

September 19, 2016

Via: Security Intelligence

Although the 2016 campaign is unique in many respects, the Donald Trump security platform largely reflects established GOP preferences on specific technology and cybersecurity issues. The platform views government regulation critically while also assigning high priority to national security regulations. […]


Access control

The Clinton Security Platform: Addressing the Future of Tech

September 19, 2016

Via: Security Intelligence

Cyber-security is not thoroughly discussed in the context of Clinton’s national security platform. And aside from a reference to “working with tech companies” to fight online propaganda, intercept communications and track social media posts, cybersecurity doesn’t play a major factor […]


Cyber warfare

The NSA’s hoard of cyber weapons makes some experts nervous

August 19, 2016

Via: CIO

The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding — and whether they should be disclosed. Security researchers have been […]


Malware

Shakti Trojan: Technical Analysis

August 18, 2016

Via: Malwarebytes

Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible attribution has led us to the conclusion that this threat is in reality not new – probably it has […]