<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

Cyber Defense Roster: Your key players in the fight against cyberattacks

Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.

Posted on November 12, 2019

The Rubber Ducky: Cyber meets physical with this small hacking tool

Your adversary may not always be on the other side of a screen.

Posted on November 11, 2019

Ransomware: How cyber attackers turn hacking into profit

Learn about the growing cyber threat that attackers use to make money… by taking yours.

Posted on November 05, 2019

Mimikatz: How cyber attackers harvest credentials post-exploitation

The bad guys got their hands on a powerful tool… and now they use it to get their hands on your passwords.

Posted on October 16, 2019

Phishing and Command & Control: How cyber attackers use emails to gain control

One of the easiest ways for cyber criminals to begin an attack is through a malicious email. Here’s a look at how they do it.

Posted on October 03, 2019

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there.

Advanced malware threats are hiding in software applications many of us use daily and trust.  So much so that legitimate software can be difficult to distinguish.  New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.

Posted on August 28, 2019

Advanced Persistent Threat: Challenge Accepted

The battle of cybersecurity is constantly advancing.

As hackers move to more complex, focused efforts, their strategies have changed and the threat has increased.

One of these strategies, advanced persistent threats (APT), is a customized, focused attack that is difficult to detect and nearly impossible to prevent. So how do companies of all sizes protect their networks and keep their customer...

Posted on February 26, 2019

WHITEBOARD WEDNESDAY: Traditional vs Advanced Malware Prevention

Think of the last time you purchased a brand new car. What if it didn’t work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition, and … nothing. The car won’t start.

Posted on August 23, 2017

Cylance vs Malware Posing as a Sneaky Flash Installer

Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!” Unless you have Cylance.

Posted on July 28, 2017

Warning Signs of a Cyber Attack

The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the Ponemon Institute, nearly half of all small businesses suffered a data breach in 2015.

In fact, The Business Journals’ latest SMB Insight study showed that over 550,000 small businesses are projected to fail in 2017 due to a cyber attack.

Posted on March 29, 2017

CylancePROTECT vs RansomFree: Do You Get What You Pay For?

As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have some pretty interesting blurbs about software or attacking a problem in a different way. Nothing too heavy, but still useful. 

Posted on February 09, 2017

Ransomware Costs Hollywood Presbyterian Medical Center $3 Million

Infogressive’s Jeff Murphy provides feedback from SC Magazine’s article “Ransomware goes to Hollywood medical centre.”

For Hollywood Presbyterian Medical Center to have paid out over three million dollars in ransomware and suffered a week of down time indicates a less than stellar cyber security posture. 

Posted on February 17, 2016

TOP ARTICLES:

QUESTIONS?