Data Breaches


21

Aug 2018

Examining Fileless Malware Threats

Most malware is file-based, meaning that your computer is infected as a result of a file being downloaded and run on your computer. This makes detection and removal easier for antivirus software since it can generate signatures of the malware files and look for those files on disk to detect and remove them. Conversely, fileless malware is designed to not leave a file on disk...

Read More


15

Aug 2018

Sticking Around: Common Windows Malware Persistence Mechanisms

Malware authors put a lot of time and effort into writing their malware and finding ways to get it installed and running on target machines. If users could get rid of malware for good by just closing it or restarting their computer, then these attackers would have put in a lot of work for minimal payoff. But hackers leverage malware persistence mechanisms to be sure...

Read More


05

Jan 2018

What you should know about Spectre and Meltdown

By Corey McReynolds Two large exploits, “Spectre” and “Meltdown”, have been released that allow reading privileged memory with side-channel attacks on Intel and ARM processors. This issue is known to affect nearly all processors in personal computers, Macs, servers and mobile devices (both Android and iOS). AMD processors are affected (only to “Spectre”), but to a much lesser degree. The result of a successful attack can...

Read More


24

Aug 2017

Petya: Cyber Warfare Deception

By Ryan Ernst The following article originally appeared in the August 2017 edition of Gulf Insider online magazine. “All warfare is based upon deception.” – Sun Tzu, The Art of War Petya, the global cyberattack launched weeks after the WannaCry ransomware, appeared at first as a new variant of the original 2016 ransomware of the same name.  However, security researchers soon identified significant differences prompting...

Read More


19

May 2017

InfoSec Threats Spread Worldwide

By Ryan Ernst InfoSec threats are a global concern. Well-publicized cyberattacks in the U.S. are only one chapter in a worldwide cyberwar. History of attacks in the Middle East The Middle East is one theater in that war. Back in 2012, Shamoon, a computer virus designed for sabotage and corporate espionage, was unleashed on Saudi Aramco, a Saudi Arabian petroleum company, in 2012. The attack wiped out...

Read More


25

Apr 2017

Shadow Brokers Release: Microsoft Exploits and Your Business

By Jason Graf It seems like something out of a spy novel: A covert band of cybercriminals releases details of extraordinary weaknesses in unsupported versions of Windows that could be used to wreak havoc on businesses and individuals worldwide. The Shadow Brokers release is real, and it has the potential to cause serious damage. On April 14, the Shadow Brokers, a hacker group originating in...

Read More


16

Dec 2016

Russel Van Tuyl Discusses Latest Yahoo Breach

Sword & Shield Managing Consultant of Security Assessments Russel Van Tuyl talks with WATE News 6 about how to protect yourself after the latest Yahoo! breach. Yahoo says it believes hackers stole data from more than one billion user accounts in August 2013. The California company says it’s a different breach from the one it disclosed in September, when it said 500 million accounts were...

Read More