Data Breaches


Data Breaches

Cybersecurity to stop cyber threats

Sword & Shield information security experts share threat intelligence about malware such as Petya, Wannacry, common windows malware persistence mechanisms, and Spectre and Metdown.

You can delve deeper to understand how to protect against insider threats and the shortfalls at the heart of big data breaches.


03

Dec 2018

Four Ways to Protect Against Insider Threats

Most cybersecurity defenses and strategies are focused on external threats in an effort to make access costlier for a hacker than the value of what they can obtain. However, developing ways to protect against insider threats is an essential part of an organization’s cybersecurity posture. The Internal Threat Landscape Most organizations are focused on the prospect of external threats. Basic security is perimeter-focused, meaning that the primary...

Read More


21

Aug 2018

Examining Fileless Malware Threats

Most malware is file-based, meaning that your computer is infected as a result of a file being downloaded and run on your computer. This makes detection and removal easier for antivirus software since it can generate signatures of the malware files and look for those files on disk to detect and remove them. Conversely, fileless malware is designed to not leave a file on disk...

Read More


15

Aug 2018

Sticking Around: Common Windows Malware Persistence Mechanisms

Malware authors put a lot of time and effort into writing their malware and finding ways to get it installed and running on target machines. If users could get rid of malware for good by just closing it or restarting their computer, then these attackers would have put in a lot of work for minimal payoff. But hackers leverage malware persistence mechanisms to be sure...

Read More


31

Jul 2018

Lessons Learned from the MD Anderson Breaches

The MD Anderson Cancer Center at the University of Texas was recently fined $4.3 million by the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) concerning data breaches that resulted in the loss of the health information of 33,500 patients. In this article, we called on one of our healthcare experts, Security Consultant Jeremy Bess, to explain what lessons can...

Read More


05

Jan 2018

What you should know about Spectre and Meltdown

By Corey McReynolds About Spectre and Meltdown Two large exploits, “Spectre” and “Meltdown”, have been released that allow reading privileged memory with side-channel attacks on Intel and ARM processors. This issue is known to affect nearly all processors in personal computers, Macs, servers and mobile devices (both Android and iOS). AMD processors are affected (only to “Spectre”), but to a much lesser degree. The result of...

Read More


17

Oct 2017

KRACK exploit explained

A recently discovered vulnerability in the most widely used wireless security standard may be one of the biggest in years. The good news is there are precautions that can be taken to keep you and your business safe. Sword & Shield’s Corey McReynolds and Joe Gray explain: What the Attack is This attack exploits a vulnerability in Wireless Protected Access (WPA), both WPA and WPA2 encryption...

Read More


15

May 2017

WannaCry Ransomware: Dangerously Different

By Jason Matlock Friday, May 12, 2017, will be remembered for what was the largest ransomware attack in internet history. The world watched as critical systems were affected by a piece of ransomware called WannaCry or Wcry for short. By the time the dust settled, more than 200,000 computers in 150 different countries were infected by WannaCry ransomware. Thanks to a security researcher named MalwareTech,...

Read More


15

May 2017

WannaCry Ransomware: Protect Yourself with These Steps

By Rick Cantrell By now much of the world has heard about the WannaCry Ransomware attack that hit Friday afternoon and continued to wreak havoc globally into the weekend. Following are details of this threat and what you can do to protect yourself.  The WannaCry Ransomware exploit is attacking a known vulnerability in SMBv1 on Microsoft products. In order to protect yourself, be sure to keep all...

Read More


25

Apr 2017

Shadow Brokers Release: Microsoft Exploits and Your Business

By Jason Graf It seems like something out of a spy novel: A covert band of cybercriminals releases details of extraordinary weaknesses in unsupported versions of Windows that could be used to wreak havoc on businesses and individuals worldwide. The Shadow Brokers release is real, and it has the potential to cause serious damage. On April 14, the Shadow Brokers, a hacker group originating in...

Read More