March, 2020 — We recently had a Malicious Operation (Malop) pop up for one of our MSP Partners' small business clients and it turned out to be a true hit, with malicious PowerShell on a couple of hosts with RDP (port 3389) open to the internet. Our Malware Prevention thankfully blocked the malicious payloads, but something was still going on that needed to be tracked down and remediated.
Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.
Your adversary may not always be on the other side of a screen.
If a single password was the barrier between an attacker and your network, would it hold up against brute force?
The bad guys got their hands on a powerful tool… and now they use it to get their hands on your passwords.
Learn one method used by attackers to gain a foothold in a network and escalate their privileges.
One of the easiest ways for cyber criminals to begin an attack is through a malicious email. Here’s a look at how they do it.
Advanced attacks are out there.
Advanced malware threats are hiding in software applications many of us use daily and trust. So much so that legitimate software can be difficult to distinguish. New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.
What is the MITRE ATT&CK Product Evaluation?
The ATT&CK evaluation framework, according to MITRE, is a new development that provides a transparent, customer-centric approach to product evaluation for cyber detection software and solutions.
The ATT&CK evaluation framework is intended to help the different stakeholders in Detection & Response (“defenders and vendors”) work together to improve...
Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today.
How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company?
It’s time to fight back with the next generation of antivirus technology.
What’s your plan if an attack makes it past your defenses?
While there are many tools and technologies that fight to keep attackers out, it’s just as important to have a plan if those fail.
A good disguise can go a long way.
Concealing your real identity and priorities can get you far, especially in cybersecurity.
When an attacker is disguised as a legitimate user, it’s harder to detect their presence, often until it’s too late. This is most evident during the cyberattack stage of lateral movement. To fight an attack at this stage, it’s important to know the objectives of...
The threat landscape is changing.
Fileless malware is a phrase that is rapidly picking up popularity in the cybersecurity industry. In fact, 77% of successful cyberattacks in 2017 utilized some form of fileless malware. So you’ve probably heard of it, and you know you should be scared of it… but what is fileless malware?
Every network has its weaknesses.
But do you know what they are and the impact they have on your network security? With the large amount of data on systems and advances in attack sophistication, it’s more important than ever to have a complete picture of what’s going on in your network.
The battle of cybersecurity is constantly advancing.
As hackers move to more complex, focused efforts, their strategies have changed and the threat has increased.
One of these strategies, advanced persistent threats (APT), is a customized, focused attack that is difficult to detect and nearly impossible to prevent. So how do companies of all sizes protect their networks and keep their customer...