Security News


16

Apr 2019

Understanding the Vaporworm Threat

Malware is constantly evolving as attackers develop new and more sophisticated variants to bypass or defeat enterprise network security defenses. In recent years, fileless malware has made headlines due to its ability to circumvent many of the protections used by traditional antivirus solutions. In 2019, the vaporworm threat has emerged as the next evolution of malware, combining the subtlety of fileless malware with the scalability...

Read More


10

Apr 2019

The Weaponization of Data

Organizations collect massive amounts of data about their users. If you have a social media account, think about how much a person could learn about you just by reading your posts. Unfortunately, some organizations have figured this out, too, and use this information to their own gain. Whether a company is selling collected data, or information is illegally obtained from them through a breach, weaponization...

Read More


13

Mar 2019

Inside Crimeware-as-a-Service

In our field our customers often express disbelief in how brazen cyber criminals can be. As a “sign of the times” entrepreneurial bad actors have started commoditizing their offering in what is called crimeware-as-a-service. This article explores this disturbing trend and its implications. What is Crimeware-as-a-Service? With the introduction of cloud computing the phrase “as-a-service” has become ubiquitous. Offerings like Software-as-a-Service (SaaS) allow organizations to...

Read More


17

Oct 2017

KRACK exploit explained

A recently discovered vulnerability in the most widely used wireless security standard may be one of the biggest in years. The good news is there are precautions that can be taken to keep you and your business safe. Sword & Shield’s Corey McReynolds and Joe Gray explain: What the Attack is This attack exploits a vulnerability in Wireless Protected Access (WPA), both WPA and WPA2 encryption...

Read More


12

Dec 2016

SOC Warning: Stealthy Stegoloader Can Evade Analysis Tools

By Lee Tibbals and Brian Lowe An interesting relic from the past came to visit recently in the form of a threat called Steganography. Steganography is a well-known and ancient practice of concealing a file, or a message inside of another file or message. The first recorded uses of steganography are accepted to have been around 440 BC in ancient Greece, where a message was...

Read More


09

Dec 2016

Experts: IoT Will Be Hacked Again in 2017

It was nearly two weeks before Halloween and nearly three weeks before Election 2016 when millions were denied access to such popular websites like Twitter, Reddit, The New York Times and PayPal. Some thought it was the Russians attempting to hack the election. Others thought it might be an early seasonal prank, but the event that blocked Internet access for large sections of the country...

Read More


01

Dec 2016

What Direction Will Trump Take on CyberSecurity?

Last week, President-Elect Donald Trump signaled that cybersecurity is an imminent challenge that requires immediate attention by announcing the creation of a Cyber Review Team to provide recommendations during the first 100 days of his presidency. In addition to a focus on trade, energy, regulations, national security and immigration, Trump plans to include cybersecurity as a top priority, but many in the industry believe Trump...

Read More


17

Nov 2016

Holiday Shopping Safety Series

Avoid holiday cyber scams and hoaxes By Joe Gray Because the cash flow is on the rise, the activity of cyber criminals are increasing as well. The purpose of this blog series is to educate you, the reader, about how to be safe through this season including Black Friday, Small Business Saturday, and Cyber Monday. While I try to be thorough, I cannot possibly cover...

Read More


16

Nov 2016

Holiday Shopping Safety Series

Shopping Safely via Credit Card and e-Commerce By Joe Gray It’s that time of year again: stores closing for a couple of hours (if at all) on Thanksgiving while others are completely closed. Black Friday is creeping into Thursday and cutting into turkey overload time. Starbucks has the peppermint syrup for our frappuccinos, lattes, and mocha drinks. Families are shopping for the best deals for...

Read More


10

Aug 2016

Turn Your Employees into CyberSecurity “Specialists”

Now that we know our employees are cyber security’s weakest link, what can you do to turn your employees into cyber security “specialists?” Having a strong data safety culture is one of the first rules for improving your organization’s security practices. This includes having written security policies that have been developed based on your organization’s particular needs. A Strategic Security Assessment can tell you everything...

Read More



Page 1 of 212