Posts

cyber endpoints bkg

Approaches to Threat Hunting

Asked yourself: “Am I breached?” “Is someone monitoring my systems right now, logging my keystrokes, stealing my credit card information or intellectual property?” How would you answer these questions in your organization? Aha, I saw what you just tried to do there. You just reached for your old, dusty antivirus scan button. Wrong. I’m sorry,…

Read More »
cyber endpoints bkg

SWIFT Reduces the Fraud Detection Gap, but not the Breach Detection Gap

On September 20th, SWIFT, the global provider of financial messaging, announced the creation of a new security tool to ‘strengthen customer fraud controls’.  This tool allows SWIFT customers (banks) to detect unusual payment flows and improve the possibility of cancelling fraudulent transfers. 

Read More »
cyber endpoints bkg

Litigation Over Retail Malware Attack – New Liability and New Solutions

It’s happened again. Another malware related breach that has impacted a company’s finances and reputation. This time it’s led to a lawsuit, not the first and certainly not the last. In this case, Noodles & Company, a fast casual restaurant based in Colorado with locations across the US, has been sued in a class-action motion by banks and other financial institutions. 

Read More »
cyber endpoints bkg

Chasing APTs: How a Hunt Evolves

Last week Infocyte was doing a product demo for a partner who wants to do compromise assessments (like these guys). They chose an existing client to do a limited scan using our product, selecting a handful of systems… and we found something interesting.

Read More »
vote election hacking

The Russians Are Coming! Election Hacks State Govt to Rethink Security

The cry “The Russians are Coming!” has taken on new meaning as a result of increased cyber threats from Russian hackers. While corporate and financial targets have been the norm for quite some time, federal and now state government targets are becoming increasingly common. The infamous DNC hack, and now an investigation into the election database hacks of Illinois and Arizona.

Read More »
cyber endpoints bkg

6 Tips on Finding Budget for New Cybersecurity Tools

Forbes recently reported that Gartner predicts IT security spending will grow to a whopping $70 billon by 2020. This prediction is supported by a Search Security survey of 2016 Information Security Spending showing 71% of respondents report increased spending, and financial giants including JPMC and Bank of America have recently stated they have unlimited security budgets. However the IT spending outlook isn’t so generous for everyone, 26% of those surveyed say their organization is flat on spending and 3% report decreased spending. 

Read More »
cyber endpoints bkg

Threat Hunting 101

The reality of today’s cybersecurity landscape is that, within a complex enterprise network, no amount of investment in security controls will stop every breach, nor will it stop a well-resourced and determined attacker from getting in if they want to.  This realization has pressed many organizations to expand beyond reactive intrusion detection systems and invest in a proactive new approach called threat hunting.

Read More »
cyber endpoints bkg

PowerShell Threat Hunting with Infocyte’s Chris Gerritz at BSides Las Vegas

In this videotaped session presented at BSides Las Vegas this August on PowerShell-Fu – Hunting on the Endpoint, CEO Chris Gerritz explores how to hunt for malware and compromises on Windows endpoints using built-in PowerShell commands and scripts.

Read More »
cyber endpoints bkg

Combating APTs – What cyber security teams aren’t doing…

If you were to come home to and find a broken window, what would you do? Would you simply get someone to patch up your window and then go about your day? If you’re like me, you would absolutely freak out – SOMEONE was in my house!!!

I would carefully go from room to room like I’m on SEAL Team 6, making sure that nobody is still in the house. This is because the greatest threat to my safety is the hidden intruder that may be still be cuddled up against winter jackets in the closet.

In the IT world, the absolute, number one vulnerability on your network is an ongoing compromise. Period. Let me repeat this – as a cyber security professional, there is no greater vulnerability to you, your career, and the success of your organization, than an ongoing compromise.

Read More »

HUNT Available on SEWP V and NETCENTS-2 Airforce and Federal Buying Contracts

Infocyte, a provider of agentless hunt technology that eradicates malware and persistent threats, announced that Infocyte HUNT is now available on the SEWP V and NETCENTS-2 buying contracts held by immixTechnology, Inc, a wholly owned subsidiary of immixGroup, Inc., and Arrow Electronics companyThese new contracts vehicles make it easier for federal agencies and the US Airforce to procure the Infocyte solution to hunt cyber threats.

Read More »