Social engineering attacks have challenged cybersecurity for years. No matter how strong your digital security, authorized human users can always be manipulated into opening the door for a clever cyber…
Browsing CategoryAdvanced Threats
Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program
You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s…
Recovering Ransom Payments: Is This the End of Ransomware?
What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged…
Malicious Reconnaissance: What It Is and How To Stop It
You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’. Before any well-organized attack, skillful or professional attackers…
New DOJ Team Focuses on Ransomware and Cryptocurrency Crime
While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address…
Top 5 Cybersecurity Podcasts to Follow in 2022
One of my favorite parts about talking to cybersecurity professionals is asking how they landed in the industry. Few tell me about a straight path to their career, like attending…
Expert Insights: What’s Next for Ransomware?
Last year, many organizations stopped talking about when the workforce would be back full-time in the office. Instead, they focused on how we build a hybrid work model for the…
Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data
Shopping online is an increasingly popular endeavor, and it has accelerated since the COVID-19 pandemic. Online sales during the 2021 holiday season rose nearly 9% to a record $204.5 billion.…
A Journey in Organizational Resilience: Insider Threats
Very much like privacy concerns, insider threats may not be the first issue to come to mind when building an enterprise cyber resilience plan. However, they should be. Here is…
Detections That Can Help You Identify Ransomware
One of the benefits of being part of a global research-driven incident response firm like X-Force Incidence Response (IR) is that the team has the ability to take a step…