Archives: Threat Intelligence Articles

Threat Intelligence Articles

Threat Intelligence Brief – July 2017

TECH TALK Threat Actor Phishing Reconnaissance The Shadow Brokers showed no signs of slowing down in June. In fact, it was quite the opposite as they launched the “Data Dump of the Month Club.” So, not only are they not slowing down, they’ve created a profitable subscriber-based business model. We attempted to highlight several key […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – June 2017

TECH TALK Minimizing damage from the next WannaCry The recent use of the Shadow Brokers’ leaked tools in recent malware campaigns ( Wannacry /Adylkuzz Botnet/EternalRocks) has highlighted a dirty little secret in the IT world: The continued reliance on unsupported, past end-of-life or unpatchable servers. These legacy systems create easily exploited holes in a corporate […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – May 2017

THIS MONTH’S THREAT: News Alert: WannaCry Ransomware By now, you’ve likely seen headlines about the global ransomware attack that has affected 230,000 users in nearly 150 countries and knocked the likes of UK’s National Health Services (NHS), Spain’s Telefonica and FedEX out of commission. The attack utilized multiple exploits and post-exploitation tools based on alleged […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – April 2017

THIS MONTH’S THREAT: Authentication Attacks Despite the increasing sophistication of threat actor tactics, authentication attacks still remain the most successful attack vector – fueled by the prevalence of weak passwords. It’s hard to believe weak passwords are so prevalent given the intense focus on data breaches. In fact, the most common passwords in the 2016 […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – March 2017

THIS MONTH’S THREAT: Improper Patch Management Engineering a completely secure product is almost impossible: Some bugs will still get through regardless of how robust an internal testing regimen is. That’s the nature of the software business. With time and effort, security researchers, admins, users and hackers find vulnerabilities within software that can compromise the integrity […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – February 2017

THIS MONTH’S THREAT: Data Backup Best Practices This month, we’re focusing on a different kind of threat; one that originates within internal IT processes and puts organizations and individuals at significant risk. We’re talking about the lack of data backup best practices. It’s a widespread issue and something that significantly enhances threat actor effectiveness. Without […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – January 2017

THIS MONTH’S THREAT: Ransom Campaigns With the hype surrounding ransomware, it’s easy to forget that this tactic is only part of a larger cyber attack category – ransom campaigns. While seemingly indistinguishable from ransomware, the overarching concept of holding data for ransom is a much larger problem than just the use of malware to encrypt […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – December 2016

THIS MONTH’S THREAT: WordPress Exploits We’re constantly monitoring security threat trends as well as attacks against our customers, and every month attackers continue to actively pursue exploitation of content management systems (CMS), especially WordPress. As the most popular CMS, it’s no surprise that WordPress is a perpetual target for threat actors. As a result, there […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – November 2016

THIS MONTH’S THREAT: Privilege Escalation Exploits and DirtyCOW Privilege escalation (privesc) techniques and exploits are used by threat actors to grant themselves root level permissions in your environment. How Privsec Techniques Work Those attempting privesc typically gain initial network access through vulnerable web services. Once in, they’ll use a web shell to maintain their presence […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – October 2016

THIS MONTH’S THREAT: Internet of Things (IoT) and the Mirai Botnet The security community was rocked in September by a record-breaking DDoS attack. This massive assault featured approximately 1 Tbps (terabit per second) of traffic directed at a single target. The attack has been attributed to an immense botnet of nearly 152,000 “smart” devices compromised […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru