Asked yourself: “Am I breached?” “Is someone monitoring my systems right now, logging my keystrokes, stealing my credit card information or intellectual property?” How would you answer these questions in your organization? Aha, I saw what you just tried to do there. You just reached for your old, dusty antivirus scan button. Wrong. I’m sorry,…Read More »
On September 20th, SWIFT, the global provider of financial messaging, announced the creation of a new security tool to ‘strengthen customer fraud controls’. This tool allows SWIFT customers (banks) to detect unusual payment flows and improve the possibility of cancelling fraudulent transfers.Read More »
It’s happened again. Another malware related breach that has impacted a company’s finances and reputation. This time it’s led to a lawsuit, not the first and certainly not the last. In this case, Noodles & Company, a fast casual restaurant based in Colorado with locations across the US, has been sued in a class-action motion by banks and other financial institutions.Read More »
The cry “The Russians are Coming!” has taken on new meaning as a result of increased cyber threats from Russian hackers. While corporate and financial targets have been the norm for quite some time, federal and now state government targets are becoming increasingly common. The infamous DNC hack, and now an investigation into the election database hacks of Illinois and Arizona.Read More »
Forbes recently reported that Gartner predicts IT security spending will grow to a whopping $70 billon by 2020. This prediction is supported by a Search Security survey of 2016 Information Security Spending showing 71% of respondents report increased spending, and financial giants including JPMC and Bank of America have recently stated they have unlimited security budgets. However the IT spending outlook isn’t so generous for everyone, 26% of those surveyed say their organization is flat on spending and 3% report decreased spending.Read More »
The reality of today’s cybersecurity landscape is that, within a complex enterprise network, no amount of investment in security controls will stop every breach, nor will it stop a well-resourced and determined attacker from getting in if they want to. This realization has pressed many organizations to expand beyond reactive intrusion detection systems and invest in a proactive new approach called threat hunting.Read More »
In this videotaped session presented at BSides Las Vegas this August on PowerShell-Fu – Hunting on the Endpoint, CEO Chris Gerritz explores how to hunt for malware and compromises on Windows endpoints using built-in PowerShell commands and scripts.Read More »
If you were to come home to and find a broken window, what would you do? Would you simply get someone to patch up your window and then go about your day? If you’re like me, you would absolutely freak out – SOMEONE was in my house!!!
I would carefully go from room to room like I’m on SEAL Team 6, making sure that nobody is still in the house. This is because the greatest threat to my safety is the hidden intruder that may be still be cuddled up against winter jackets in the closet.
In the IT world, the absolute, number one vulnerability on your network is an ongoing compromise. Period. Let me repeat this – as a cyber security professional, there is no greater vulnerability to you, your career, and the success of your organization, than an ongoing compromise.Read More »
Infocyte, a provider of agentless hunt technology that eradicates malware and persistent threats, announced that Infocyte HUNT is now available on the SEWP V and NETCENTS-2 buying contracts held by immixTechnology, Inc, a wholly owned subsidiary of immixGroup, Inc., and Arrow Electronics company. These new contracts vehicles make it easier for federal agencies and the US Airforce to procure the Infocyte solution to hunt cyber threats.Read More »