Chimera Changes the Ransomware Game

playing-with-fire

Ransomware is nothing new. The first known ransomware surfaced in 1989. However, it took the Internet revolution along with introduction of automated online payment systems before organized cyber gangs saw that ransomware could become a giant cash cow. We’re talkin’ big money and extortion on a global scale here. The ROI ain’t bad either. The […]

Continue Reading →

A Brief History of Ransomware

black-and-white-people-bar-men

The first documented and purported example of ransomware was the 1989 AIDS Trojan, also known as PS Cyborg1. Harvard-trained evolutionary biologist Joseph L. Popp sent 20,000 infected diskettes labeled “AIDS Information – Introductory Diskettes” to attendees of the World Health Organization’s international AIDS conference.

Continue Reading →

Today I Learned: The Babadook is IN the computer

TIL2

Each week, we’ll bring you the latest news on exploits, protecting your perimeter and keeping your data secure. Informative. Entertaining. Best of all, each post is like an energy bar for IT! It’ll take you less than 2 minutes to read. Enjoy! Most people naming exploit software pull from a pastiche of leetspeak and juvenile humor […]

Continue Reading →

What IT People Say and What They Really Mean

SONY DSC

Do you think the adage, “We rarely say what we mean” is true? Particularly in the IT world? Inspired by AWS in Plain English, I worked with Mike and Andy to create a list of frequently used phrases and decoded them so you really know what IT people mean. Submit a comment! Tell us what you’ve […]

Continue Reading →

Introducing Varonis UBA Threat Models

VTM3

If you’re a regular reader of our blog, you know that we feel that the perimeter is dead, and that the battle against insider (and outsider) threats is won with User Behavior Analytics (UBA), which is why we’re so excited to announce the launch of Varonis UBA Threat Models in beta release of 6.2.5. What are […]

Continue Reading →

Beware: CryptoWall 4.0 is on the loose!

red-bricks-wall-animal

Vulnerabilities and threats are a lot like popularity contests in terms of how they get viewed by the media. The latest threat that’s getting extremely popular— some might even say #winning — is ransomware. It’s a type of malware that encrypts a victim’s files and subsequently demands a ransom in exchange for the key that […]

Continue Reading →

How to track unstructured data KPIs for the C-level

kpis

DatAdvantage has built-in reports to help track key metrics, in order to protect your data from overexposure and protect sensitive files. These KPI reports provide immediate and long-term benefits, allowing you to track and maintain the status of any change or remediation effort, maintain the stability of existing unstructured repositories, and identify, and remediate anomalies before they […]

Continue Reading →

Living Off the IT Land With Malware-Less Hacking

wood-nature-sun-forest-large

We’ve been lately hearing more about the trend in malware-free attacks. At RSA 2015, it was a topic of conversation by security pros. Ed Skoudis told us about it as well in our interview. And Dell SecureWorks has been on the case with what they refer to as hackers’ “living off the land”. Ultimate Stealth We […]

Continue Reading →

Penetration Testing Explained, Part IV: Making the Lateral Move

800px-2006_09_09_Ohio_State_vs_Texas

You can think about the post-exploitation part of penetration testing as an army or rebel force living off the land. You’re scrounging around the victim’s website using what’s available — shells, networking utilities, berries, poorly protected password files, etc. Kidding about the berries, but the idea is to import as little malware as possible and […]

Continue Reading →

Today I Learned: How to exfiltrate files from a machine via DNS

cute-cuddly-toy-cartoon-costume

Each week, we’ll bring you the latest news on exploits, protecting your perimeter and keeping your data secure. Informative. Entertaining. Best of all, each post is like an energy bar for IT! It’ll take you less than 2 minutes to read. Enjoy! Computers compromised by malware are like a man dressed in a panda suit. In […]

Continue Reading →