by Jon | Oct 6, 2016 | Blog, News
RiskAnalytics Internship: The Future of Security https://www.riskanalytics.com/wp-content/uploads/2017/10/thefutureofsecurity.m4v “We’re dealing with such exceptional individuals at a young age that all of us that had interactions with the interns have come away...
by Jon | Sep 7, 2016 | Blog
Rule of three: Patching, training and least privilege (Part 3) This is the final post in our “Rule of three” series. Today’s topic is least privilege. Least privilege is a principle of access control that says no user should be granted any higher privileges than those...
by Jon | Aug 31, 2016 | Blog
Rule of three: Patching, training and least privilege (Part 2) This is the second post in our “Rule of three” series. Today we’re going to talk about training. User behavior is implicated in an estimated 60 to 80 percent of data breaches.(1) Our industry commonly...
by Jon | Aug 26, 2016 | Blog
As of Monday September 11, RA Labs is tracking a nascent BotNet that appears to consist mostly of exploited routers. While it bears some similarity to other popular telnet “IoT” BotNets, we have not yet determined which family this one belongs to. At first, our team...
by Jon | Aug 24, 2016 | Blog
Ransomware: A long way past notes and magazine clippings I Imagine if all your data was cybernapped — held hostage until you paid a fee to free it. It may seem like some thrilling plot from a blockbuster sci-fi movie, but the truth is ransomware is very real — and...
by Jon | Aug 22, 2016 | Blog
Using fast flux to sell stolen credit cards Today we’re sharing another excerpt from our report about the Dark Cloud fast flux network. Some of the oldest active domains hosted on the fast flux network are carder1 sites aimed at selling stolen credit card data to...