Threat Intelligence Articles

Threat Intelligence Articles

Threat Intelligence Articles

Threat Alert – Armor Warns Online Retailers of Increased Attacks

Threat Alert – Armor has found what it believes to be the first Magecart-style (credit card sniffing) attack tool to be openly offered for sale on the Dark Web.

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – Q1 2018

In April, we released the much-anticipated Black Market Report, based on three months’ worth of Dark Web research from Armor’s Threat Resistance Unit. The report features some scary information, like how much your personal data is worth and how cheap cybercrime-as-a-service can be.

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – September 2017

TECH TALK Locky Ransomware With the media frenzy of the WannaCry and Petya ransomware events earlier this summer, you’d be forgiven for forgetting about Locky. However, this ransomware variant continues to be a serious threat even a year after its release. Case in point, three major botnet spam campaigns delivered Locky variants in April and […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – August 2017

TECH TALK With email phishing’s continued popularity and effectiveness, it’s important that we expand on last month’s topic with an overview of email header analysis. Analyzing email headers can help you determine if the email is spoofed, or manipulated so that the source of the email appears to be from a familiar source. Spoofed emails […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – July 2017

TECH TALK Threat Actor Phishing Reconnaissance The Shadow Brokers showed no signs of slowing down in June. In fact, it was quite the opposite as they launched the “Data Dump of the Month Club.” So, not only are they not slowing down, they’ve created a profitable subscriber-based business model. We attempted to highlight several key […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – June 2017

TECH TALK Minimizing damage from the next WannaCry The recent use of the Shadow Brokers’ leaked tools in recent malware campaigns ( Wannacry /Adylkuzz Botnet/EternalRocks) has highlighted a dirty little secret in the IT world: The continued reliance on unsupported, past end-of-life or unpatchable servers. These legacy systems create easily exploited holes in a corporate […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – May 2017

THIS MONTH’S THREAT: News Alert: WannaCry Ransomware By now, you’ve likely seen headlines about the global ransomware attack that has affected 230,000 users in nearly 150 countries and knocked the likes of UK’s National Health Services (NHS), Spain’s Telefonica and FedEX out of commission. The attack utilized multiple exploits and post-exploitation tools based on alleged […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – April 2017

THIS MONTH’S THREAT: Authentication Attacks Despite the increasing sophistication of threat actor tactics, authentication attacks still remain the most successful attack vector – fueled by the prevalence of weak passwords. It’s hard to believe weak passwords are so prevalent given the intense focus on data breaches. In fact, the most common passwords in the 2016 […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – March 2017

THIS MONTH’S THREAT: Improper Patch Management Engineering a completely secure product is almost impossible: Some bugs will still get through regardless of how robust an internal testing regimen is. That’s the nature of the software business. With time and effort, security researchers, admins, users and hackers find vulnerabilities within software that can compromise the integrity […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Threat Intelligence Articles

Threat Intelligence Brief – February 2017

THIS MONTH’S THREAT: Data Backup Best Practices This month, we’re focusing on a different kind of threat; one that originates within internal IT processes and puts organizations and individuals at significant risk. We’re talking about the lack of data backup best practices. It’s a widespread issue and something that significantly enhances threat actor effectiveness. Without […]

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru