Tag: Malware


Apr 2019

Understanding the Vaporworm Threat

Malware is constantly evolving as attackers develop new and more sophisticated variants to bypass or defeat enterprise network security defenses. In recent years, fileless malware has made headlines due to its ability to circumvent many of the protections used by traditional antivirus solutions. In 2019, the vaporworm threat has emerged as the next evolution of malware, combining the subtlety of fileless malware with the scalability...

Read More


Dec 2018

Using Application Whitelisting to Stop Malware

Phishing attacks are one of the most common methods attackers use to breach organizational defenses and gain access to the network. In many cases, the purpose of the phishing attack is to execute malicious software on the target computer. Developing and enforcing an application whitelist is one way organizations can dramatically decrease the threat these phishing attacks pose to their corporate cybersecurity. This article explains...

Read More


Jul 2017

Reverse Engineering Malware: Using Data Carving in Incident Response

Information security professionals, especially those who serve as “blue teamers” or enterprise defenders, are dealing with an evolving array of malware threats. In the blue team toolkit, one of the most important and difficult techniques is the ability to reverse engineer malware. Joe Gray, enterprise security consultant for Sword & Shield Enterprise Security, writes about his experience learning the techniques of reverse engineering malware using...

Read More


May 2017

Not Patching your Agency’s Networks Can Make you WannaCry

While the US government has confirmed that none of its networks were effected by last weekend’s WannaCry ransomware, a recent presidential executive order could help make federal agencies more accountable for their cybersecurity even as it sets unrealistic deadlines. Over the weekend, WannaCry exploited a Microsoft Windows vulnerability to shut down computers in 150 countries. Microsoft had issued a patch for the vulnerability in March,...

Read More