Search Results for: Advanced Persistent Threat Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten... Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Blog Post FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think... Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... Blog Post What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected... Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your... Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... Blog Post NY Metro InfraGard Members Alliance & LIFARS Present: Cyber Threats In The Time Of COVID-19 July 19, 2020 From Ransomware to Nation States, what are we seeing and how do we stop it? Case Studies of Recent Cyber... Blog Post Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Blog Post DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers,” presentation by Ladislav B. August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own... Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated... Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten...
Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Blog Post FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think...
Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
Blog Post What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected...
Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your...
Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
Blog Post NY Metro InfraGard Members Alliance & LIFARS Present: Cyber Threats In The Time Of COVID-19 July 19, 2020 From Ransomware to Nation States, what are we seeing and how do we stop it? Case Studies of Recent Cyber...
Blog Post Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
Blog Post DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers,” presentation by Ladislav B. August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own...
Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...
Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...