GhostAdmin: The Invisible Data Thief - Notes from the Underground
February 27, 2017 | Julia Kisielius
Data theft is a major threat to businesses in today’s economy. With large ...
Practical Advice To Stop Malware, Phishing & Spoofed Email Attacks From Head of IT
December 27, 2016 | Jeff Gray
This is a note I sent to our entire company last week. It was thought to be ...
Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise
December 12, 2016 | Chuck Brooks
Escalating cyber-attacks on corporations, infrastructure, and organizations ...
Daserf – A Backdoor to Espionage
August 24, 2016 | Patrick Bedwell
Background Daserf is an example of a backdoor, malware that provides attackers ...
OnionDog – An Example of a Regional, Targeted Attack
August 09, 2016 | Patrick Bedwell
Background Bad actors are getting more sophisticated with the techniques they ...
Keydnap – All Your Keychain Are Belong to Us
July 15, 2016 | Patrick Bedwell
Background Malware that attempts to harvest credentials from compromised ...
FastPOS, Point of Sale Malware Targeting SMEs
June 23, 2016 | Patrick Bedwell
Background Point of Sale (POS) threats are often associated with the retail ...
How Attackers Use a Flash Exploit to Distribute Crimeware and Other Malware
May 27, 2016 | Patrick Bedwell
Background Adobe Flash is multimedia software that runs on more than 1 billion ...
Infy Malware – Almost 10 years of Espionage; One Family of Malware
May 19, 2016 | Patrick Bedwell
Background As we all know, nothing on the internet never goes away. Ever. ...
Cmstar APT Malware Exploits CVE-2012-0158
March 30, 2016 | Patrick Bedwell
Background APTs (Advanced Persistent Threats) are a type of threat that targets ...
Rootkit Detection: Techniques and Best Practices
March 28, 2016 | Garrett Gross
Continuing my discussion of common classes of attacks, this time I’ll be ...
Matryoshka Malware from CopyKittens Group
December 15, 2015 | Garrett Gross
A dangerous weapon in the hands of a skilled attacker is alarming but that same ...
Cherry Picker POS Malware Scraping Memory and Evading Detection
December 04, 2015 | Garrett Gross
Every holiday season, retailers become prime targets for point of sale (POS) ...