Blog

classic cyber hacker stock photo

The Ghosts of Cyber Past, Present and Future

December 20, 2017

The holiday shopping season is well upon us. In the US 2017 holiday online sales are at an all-time high, with online transactions on Cyber Monday in the US reaching a record $6.59 billion. With online holiday shopping quickly becoming the preferred choice of consumers over brick and mortar stores, consumers and retailers need to be on the lookout for Cyber Ghosts, that unlike Scrooge’s visitors, come for those with a generous spirit. But don’t despair there is hope if you change your old cybersecurity ways.

Read More »
cyber risk compromise assessment

Compromise vs Vulnerability Assessments

December 14, 2017

During the recent International Cyber Security and Intelligence Conference info security execs were lectured on the importance of being proactive vs reactive to stop cyberattacks. As part of a proactive strategy speaker Nik Alleyne, senior manager of cyber security at Forsythe Solutions Group, recommended vulnerability assessments and regular penetration tests. While these are important tools for evaluating cybersecurity risk, they only answer half of the security paradox; “Can I be hacked?” They do not answer the more vital question; “Am I already breached?”

Read More »
siem alert validation

False Alarm or Real Threat? The Dangers of Alert Fatigue

December 7, 2017

Many enterprises rely on security information and event management (SIEM) solutions to help detect suspicious activity on their networks. However, despite SIEM’s attempts to dedup, contextualize, and correlate thousands to millions of alerts daily, many organizations find themselves drowning in irrelevant and/or false positive data. The resulting ‘alert fatigue’ increases the likelihood that a real threat will be missed, wreaking havoc on your systems and reputation.

Read More »

6 Host Indicators of Compromise to Hunt For

November 30, 2017

Proactive threat hunting is quickly becoming a must for any organization that’s serious about protecting itself and its bottom line. But where do you start? We’ve assembled a list of the top 6 host indicators of compromise that every organization needs to be looking for to find hidden malware and APTs that threaten the security of your systems and data.

Read More »
atm hacking malware

The ATM Malware Update

November 20, 2017

Banks continue to come under designed attack from malware and APTs. Indeed, the prevalence of financial malware is more than double that of ransomware. Overall, the cybersecurity threat landscape has made significant advancements to target verticals with high value assets and business models, making the financial sector in general a prime target.

Read More »
retail hacking terminal

Ensure Hackers Don’t Shop Your POS Data this Holiday Season

November 15, 2017

The holidays signal the peak shopping season for both brick and mortar shops and online retailers. This year’s sales are predicted to bring in $682 billion for US retailers alone. But as the holiday shopping season approaches, we also need to brace for more retail focused cyberattacks from Point Of Sale (POS) malware attacks to retail and bank account takeovers.

 

Read More »

The Evolution of Cybersecurity and the Rise of Threat Hunting

November 8, 2017

Security approaches need to evolve. Most IT and security pros continue to believe that the best shield against cybercrime involves strengthening a network’s perimeter to keep attackers out and antivirus software for endpoint defense. The need for new security approaches that improve response time or action has never been more apparent, as threats (unfortunately) arise more quickly than security strategies.

 

Read More »

Dark Tales from the Cyber Crypt: How to Hunt in the Shadows

October 31, 2017

Cybersecurity pros beware, your systems may be lurking with untold dangers and shadowy characters that could be the source of never-ending nightmares. The good news is you don’t have to run in terror from these threats. Like any good vampire slayer or werewolf hunter, you just need a strategy and the right tools to stop them in their tracks.

Read More »
splunk threat hunting dashboard

New Infocyte HUNT App for Splunk Enterprise

October 25, 2017

Infocyte has developed a new integration with Splunk Enterprise to provide users with enhanced data-centric hunt, incident investigation and response capabilities. The new Infocyte HUNT App integrates Splunk Enterprise with the Infocyte platform to provide Splunk users with post breach detection, leveraging Forensic State Analysis (FSA) for more comprehensive and scalable detection of fileless implants, persistence mechanisms and forensic evasions. 

Read More »

Controlling Dwell Time – It’s About Much More than Compliance

October 17, 2017

Dwell time, or the breach detection gap, are cybersecurity terms used to describe the period of time between malware executing within an environment and it being detected. Detection can be achieved through a variety of security procedures and solutions, however it seems to often occur when an enterprise is notified of suspicious banking activity or a data breach.

Read More »