The Human Firewall

The Human Firewall

Traditionally firewalls have been considered the edge of a network perimeter, and the first line of defense against cyber attacks. Firewalls, however, can only be as effective as the weakest link in the security chain. Often, the weakest link is on your payroll. This...
Andromeda command-and-control on SourceForge

Andromeda command-and-control on SourceForge

by Seth Elo We are no strangers to online code repositories and social media being abused for malicious intents. Attackers will use services like these in hopes to make their malware harder to detect, easier to manage, and give their bot’s C2 communications a lower...
Petya Ransomware

Petya Ransomware

In the last half of 2016, the rise of ransomware became a force to be reckoned with, with several new variants being discovered weekly. That trend has shown no signs of stopping in 2017. With one of the latest variants – called Petya by parts of the security community...
Andromeda command-and-control on SourceForge

Coming To a Break Room Near You: Point-of-sale malware

Coming To a Break Room Near You: Point-of-sale malware by Noah Dunker At about 6:00 AM on July 4th, 2017 RiskAnalytics’ ThreatSweep platform identified a break room vending kiosk at a customer’s office that had been infected with a point-of-sale malware family that’s...
WannaCry Ransomware Outbreak

WannaCry Ransomware Outbreak

by Noah Dunker A new variant of the WannaCry ransomware family, “WanaCrypt0r 2.0,” was discovered in the wild sometime around 8:00 AM GMT, Friday, May 12, 2017. This “worm” variant of WannaCry spreads by using a recently-fixed critical-severity Microsoft...