GhostAdmin: The Invisible Data Thief - Notes from the Underground

February 27, 2017 | Julia Kisielius

Data theft is a major threat to businesses in today’s economy. With large ...

Practical Advice To Stop Malware, Phishing & Spoofed Email Attacks From Head of IT

December 27, 2016 | Jeff Gray

This is a note I sent to our entire company last week. It was thought to be ...

Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise

December 12, 2016 | Chuck Brooks

Escalating cyber-attacks on corporations, infrastructure, and organizations ...

Daserf – A Backdoor to Espionage

August 24, 2016 | Patrick Bedwell

Background Daserf is an example of a backdoor, malware that provides attackers ...

OnionDog – An Example of a Regional, Targeted Attack

August 09, 2016 | Patrick Bedwell

Background Bad actors are getting more sophisticated with the techniques they ...

Keydnap – All Your Keychain Are Belong to Us

July 15, 2016 | Patrick Bedwell

Background Malware that attempts to harvest credentials from compromised ...

FastPOS, Point of Sale Malware Targeting SMEs

June 23, 2016 | Patrick Bedwell

Background Point of Sale (POS) threats are often associated with the retail ...

How Attackers Use a Flash Exploit to Distribute Crimeware and Other Malware

May 27, 2016 | Patrick Bedwell

Background Adobe Flash is multimedia software that runs on more than 1 billion ...

Infy Malware – Almost 10 years of Espionage; One Family of Malware

May 19, 2016 | Patrick Bedwell

Background As we all know, nothing on the internet never goes away. Ever. ...

Cmstar APT Malware Exploits CVE-2012-0158

March 30, 2016 | Patrick Bedwell

Background APTs (Advanced Persistent Threats) are a type of threat that targets ...

Rootkit Detection: Techniques and Best Practices

March 28, 2016 | Garrett Gross

Continuing my discussion of common classes of attacks, this time I’ll be ...

Matryoshka Malware from CopyKittens Group

December 15, 2015 | Garrett Gross

A dangerous weapon in the hands of a skilled attacker is alarming but that same ...

Cherry Picker POS Malware Scraping Memory and Evading Detection

December 04, 2015 | Garrett Gross

Every holiday season, retailers become prime targets for point of sale (POS) ...