<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware

Hacking

Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware

Cybereason Nocturnus detected a series of targeted attacks against high-profile targets that uses a new variant of Anchor_DNS and a new malware dubbed Anchor.

Hackers use all data on a target when planning an attack

Hacking

Hackers use all data on a target when planning an attack

Conducting reconnaissance is an essential part of all hacking operations. Figuring out what kinds of IT and information security systems an organization uses helps adversaries anticipate how their target will respond to an attack.

Lessons Learned from the Hacking Team Getting Hacked

Advanced Persistent Threat

Lessons Learned from the Hacking Team Getting Hacked

Pretty much everything about the company was put on display including Exchange server data, source code, RAT installers, emails, sensitive documents and screenshots from employee machines. So much business-critical data was leaked other hackers could have used it to replicate the company.

The components of modern hacking operations

Advanced Persistent Threat

The components of modern hacking operations

Lior Div, in his latest Network World blog post, discusses how attack planning is handled like a business operation and includes hiring plans, budgets and timelines.

Hacking

Security’s 2F2R Syndrome: Why fast remediation helps hackers maintain persistence in your network

IT department productivity is often measured by how quickly problems are solved. This approach makes sense in the business world: workers can’t use malfunctioning machines so when a computer is down, employee productivity and, by extension, a company’s productivity suffer.

Forbes: Why The Hacking Team Breach Further Tips The Scales Against Businesses

Data Breaches

Forbes: Why The Hacking Team Breach Further Tips The Scales Against Businesses

While we're away at Black Hat USA 2015 in Las Vegas, my latest article over at Forbes highlights the Hacking Team data leak and what exactly it means for businesses trying to improve their security.

Breaking Down the Hacking Team Attack Operation

Hacking

Breaking Down the Hacking Team Attack Operation

Last week we discussed why the Hacking Team leak is a game-changing event for cyber security, providing a brief overview of the tools the team used and distributed to their clients and the rather sophisticated tactics they deployed in order to sustain long-term operations.

Hacking Team [Hacked Team] Leak Unleashes Flame-Like Capabilities Into the Wild

Hacking

Hacking Team [Hacked Team] Leak Unleashes Flame-Like Capabilities Into the Wild

providing us with even more clues into the latest techniques and tactics hackers are using, and how easily they are able to maintain their attacks over time.

Cybereason Labs Research: Operation Kofer - New Mutating Ransomware Group

Ransomware

Cybereason Labs Research: Operation Kofer - New Mutating Ransomware Group

A team of Cybereason Labs researchers, headed by Uri Sternfeld, Senior Security Researcher, announced today the discovery of a massive ransomware operation it has named “Operation Kofer”.