the-cost-of-cyber-attacks-on-businesses—-Email—Header

Cyber Attacks: The Cost to Businesses

Last year, cyber attacks rose by 23% and cost companies an average of almost $12 million. One of the biggest cyber attacks in 2017 was the data breach of U.S credit reporting agency, Equifax. Hackers breached the personal data of approximately 145 million U.S customers, as well as about 19,000 customers in Canada and 400,000 in the U.K. Hackers, accessed …

Logo2000

Threats of the Week – May 14, 2018

  Vega Stealer Ransomware   Vega Stealer is a variant of August Stealer. Written in .NET, August Stealer locates and steals credentials, sensitive documents, and cryptocurrency wallet details from infected machines. Vega Stealer is also written in .NET and focuses on the theft of saved credentials and payment information in Google Chrome. These credentials include passwords, saved credit cards, profiles, and …

Non-Malware-Attacks—-Email—Header

Non-malware attacks are on the rise, but how do we protect against them?

Non-malware attacks are on the rise, but how do we protect against them? Majority of cyber incidents reported in 2017 are non-malware based, yet many are not even aware they exist. According to a study by the Ponemon Institute, 77 percent of compromised attacks organizations faced in 2017 were fileless. The report estimates that fileless attacks are ten times more likely …

Logo2000

Threats of the Week – May 7, 2018

  SynAck Ransomware   The Process Doppelgänging attack takes advantage of a built-in Windows function, i.e., NTFS Transactions, and an outdated implementation of Windows process loader, and works on all modern versions of Microsoft Windows OS, including Windows 10. Process Doppelgänging attack works by using NTFS transactions to launch a malicious process by replacing the memory of a legitimate process, tricking process …

Creating-a-Cyber-Security-Self-Assessment—-Email—Header

Create a Cyber Security Self-Assessment

If you haven’t already done so, make sure you create a cybersecurity self-assessment. In an increasingly digital world cyber-attacks on businesses have become an everyday reality. In 2017 there were countless reports about cybersecurity, including phishing scams, ransomware and new attack methods. For 2018, security experts are predicting even bigger attacks and smarter hacks that could be met with heavy …

Logo2000

Threats of the Week – April 30, 2018

  XIAOBA Ransomware   A sophisticated file infector with cryptocurrency mining and worm capabilities and found two variants of this file infector during our investigation. Identified as XiaoBa (detected by Trend Micro as PE_XIAOBAMINER), this particular malware is distinctly similar to the XiaoBa ransomware. It seems like the ransomware code was repurposed, adding new capabilities to make it a more …

10-Things-to-do-if-your-email-has-been-hacked—-Email—Header2

Your Email Has Been Hacked, What Would You Do?

Your email has been hacked, what would you do? In 2017, over 700 million email addresses (and passwords) were leaked publicly courtesy of a misconfigured spambot (program designed to collect email addresses). Data breaches are alarmingly common and can wreak havoc on your organization. An email statistics report in 2015 indicated that the number of worldwide email users is set …

Logo2000

Threats of the Week – April 23, 2018

  EMOTET Malware   We currently know of only one method of distribution for the Emotet banking Trojan: distribution of spam mailings that include malicious attachments or links. The attached files are usually ZIP archives containing the Emotet loader. The files in the archives have long names, e.g. rechnung_november_2014_11_0029302375471_03_44_0039938289.exe. This is done on purpose: a user opening the archive in …

83-Of-Enterprises-Are-Complacent-About-Mobile-Security—Email—Header

Mobile Security Threats Are More Pressing Than Ever Before

Mobile security threats are now more pressing than ever before. Everyone has a mobile device at work, so how can enterprises ensure they remain secure? Most companies have a security infrastructure for on-premise servers, networks, and endpoints, yet 83% of enterprises are complacent about mobile security. Smartphones have become prevalent within enterprises in recent years making them an appealing target for …