Posts

cyber endpoints bkg

The Role of Compromise Assessments in Enterprise Security

The role of intrusion detection is typically fulfilled by real-time intrusion detection systems and anti-virus software in conjunction with a continuous monitoring strategy. A compromise assessment differs from intrusion detection in that it is an active dedication of analytical resources with a focus on indicators of successful compromise. 

Read More »
cyber endpoints bkg

Service Halted: Protecting Public Transit Networks from Cyberattacks

Last week’s ransomware attack on the San Francisco (Muni) transit system’s ticketing machines demonstrated that hackers are casting a wide net on their potential targets. Cybersecurity is a growing concern for public transit managers as their services become increasingly dependent on networked information technology. These systems are vulnerable to cyberattack which could disrupt operations or cause financial damage, as the Muni attack demonstrated.

Read More »
cyber endpoints bkg

​Infocyte’s threat hunting recognized by SC Media’s 2017 Trust Awards

We are excited to share Infocyte HUNT has been recognized as a Trust Award finalist in the Best Computer Forensic Solution category for the 2017 SC Awards. The finalists and winners for the Trust Awards are chosen by a distinguished group of leading cybersecurity professionals from the SC Media readership and selected by the SC editorial team. 

Read More »
cyber endpoints bkg

Protecting Payment Cardholders from ATM Malware Attacks

ATM machines have long been targeted by thieves before, and are unarguably a security weak point of financial institutions. A recently publicized breach has resulted in Indian banks becoming the latest victims of unknown malware running on ATM machines. The breach affected ATMs that were managed by Hitachi Payment Services for 19 Indian banks and is estimated to have compromised at least 3.2 million debit cards over a 4-6 week period prior to its discovery. 

Read More »
cyber endpoints bkg

Beware! 4 Cyber Scares and Steps to Hunt Them

IT and security professionals, beware! Here are four cyber scares to avoid this Halloween and protect your organization from year-round. The good news is you don’t have to run from cyber scares. Like any good vampire slayer or werewolf hunter, you just need a strategy and some special tools built to get the job done.

Read More »
cyber endpoints bkg

TV5 Monde Malware Attack – A Cautionary Tale and Lessons Learned

In April 2015, France’s TV5 Monde launched a new station, bringing its media offering to 12 channels, when it suffered a crippling malware attack that took all 12 channels off the air.  Prevention was possible. Read on to learn why.

Read More »
forensic state analysis

#CyberAware – Recognizing and Combating Cybercrime – Resources

October is National Cyber Security Awareness Month (NCSAM) and this week’s theme is “Recognizing and Combating Cybercrime”. We’ve pulled together some resources on threat hunting and the important role it plays in identifying and combating malware and persistent threats that have made it onto your systems. From beginners to security pros, there’s something for everyone to remain #CyberAware.

 

Read More »
cyber endpoints bkg

No Experience Required: Why you don’t need to be an expert to cyber hunt

Cyber hunting has increasingly become a hot topic in the security industry. Some great articles have recently been published to introduce security and IT pros to the concept and highlight why it’s essential for cyber security best practices. However, industry commentators and experts alike all seem to agree that the only way to do this is using highly skilled and trained forensic threat hunting teams. We examine why you don’t need to be an expert to cyber hunt.

Read More »
cyber endpoints bkg

Approaches to Threat Hunting

Asked yourself: “Am I breached?” “Is someone monitoring my systems right now, logging my keystrokes, stealing my credit card information or intellectual property?” How would you answer these questions in your organization? Aha, I saw what you just tried to do there. You just reached for your old, dusty antivirus scan button. Wrong. I’m sorry,…

Read More »
cyber endpoints bkg

SWIFT Reduces the Fraud Detection Gap, but not the Breach Detection Gap

On September 20th, SWIFT, the global provider of financial messaging, announced the creation of a new security tool to ‘strengthen customer fraud controls’.  This tool allows SWIFT customers (banks) to detect unusual payment flows and improve the possibility of cancelling fraudulent transfers. 

Read More »