by Jon | Sep 6, 2017 | Blog
Traditionally firewalls have been considered the edge of a network perimeter, and the first line of defense against cyber attacks. Firewalls, however, can only be as effective as the weakest link in the security chain. Often, the weakest link is on your payroll. This...
by Jon | Aug 24, 2017 | Blog
by Seth Elo We are no strangers to online code repositories and social media being abused for malicious intents. Attackers will use services like these in hopes to make their malware harder to detect, easier to manage, and give their bot’s C2 communications a lower...
by Jon | Jul 10, 2017 | Blog
In the last half of 2016, the rise of ransomware became a force to be reckoned with, with several new variants being discovered weekly. That trend has shown no signs of stopping in 2017. With one of the latest variants – called Petya by parts of the security community...
by Jon | Jul 7, 2017 | Blog
Coming To a Break Room Near You: Point-of-sale malware by Noah Dunker At about 6:00 AM on July 4th, 2017 RiskAnalytics’ ThreatSweep platform identified a break room vending kiosk at a customer’s office that had been infected with a point-of-sale malware family that’s...
by Jon | Jun 1, 2017 | Blog
by Noah Dunker A new variant of the WannaCry ransomware family, “WanaCrypt0r 2.0,” was discovered in the wild sometime around 8:00 AM GMT, Friday, May 12, 2017. This “worm” variant of WannaCry spreads by using a recently-fixed critical-severity Microsoft...
by Jon | Jun 1, 2017 | Blog
by Noah Dunker Last week, RA Labs noticed MS17-010 exploit attempts against production networks we’re monitoring, seemingly unrelated to the massive WannaCry outbreak two weeks ago. On Monday, May 22, we observed an active worm at one customer site. We immediately...