On Jun. 27th, 2017, The Petya ransomware is receiving worldwide attention by attacking the governments, banks, electrical systems, communication systems, enterprises, and airports in several countries. The attacking virus is the Petya ransomware variant, which spreads through combinations of the email, downloader and the worm. It exploits a vulnerability (CVE-2017-0199) through the RTF attachment in…
If the headlines can remind us anything, it’s that hackers are always on the hunt, using the most cutting edge tools to breach and infiltrate networks and assets. This week, reports of a new ICS-specific malware, called CrashOverride or Industroyer , has hit the headlines. Industroyer’s critical differentiator lies in the fact that it uses…
Malware outbreaks have several characteristics: First, the vulnerabilities that are being used are 0-day or n-day exploits on commonly used software. The widespread use of these commonly used software means there are lots of potential targets. Because not everyone may patch their software in a timely manner, there are many unpatched systems on the network….
In the morning of May 12th, a global outbreak of a large-scale extortion software incident made headlines, impacting a total of 99 countries, and at least 75,000 Windows computer systems. It affected Education, Medical and other critical institutions, and is continuing to spread rapidly. Background The ransomware is a new type called “WanaCrypt0r 2.0” and…

2017 Security Trends

Enterprise Security In enterprise security investment, more emphasis has been put on post breach detection and incident response for this passing year. We will see this trend continue in 2017. Technologies in the area of breach detection, data leak protection, remediation, and so forth, are focusing on the full cyber kill chain rather than an…

Events