Full Decryption Of Systems Encrypted By Petya/NotPetya

Full Decryption of Systems Encrypted by Petya/NotPetya

As demonstrated in the previous blog post about decryption of Petya/NotPetya, almost the complete Master File Table (MFT) can be…

READ MORE
North Korea’s Global Cyberattacks: Potential For Destruction

North Korea’s Global Cyberattacks: Potential for Destruction

North Korea is “just a keystroke away” from launching destructive attacks that could cripple the critical infrastructure of countries that…

READ MORE
Education And The Darknet: How Hackers Profit From Your Data

Education and the Darknet: How Hackers Profit from Your Data

Since its inception in early 2014, the Russian darknet marketplace xDedic has accumulated a stockpile of over 85,000 hacked servers…

READ MORE
Software Supply Chain Attacks On The Rise, Undermining Customer Trust

Software Supply Chain Attacks on the Rise, Undermining Customer Trust

On June 27, 2017, a destructive payload dubbed “NotPetya” by researchers, was deployed covertly using a legitimate software package employed…

READ MORE
Protecting The Software Supply Chain: Deep Insights Into The CCleaner Backdoor

Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor

The term “supply chain attacks” means different things to different people. To the general business community, it refers to attacks…

READ MORE
HIPAA PHI Getting Tougher To Safeguard But Compliance Is Still Critical

HIPAA PHI Getting Tougher to Safeguard but Compliance is Still Critical

The Health Insurance Portability and Accountability Act (HIPAA) has big consequences for organizations of all sizes. Companies and institutions that…

READ MORE
Why Cybersecurity Must Be A Board-Level Discussion

Why Cybersecurity Must Be a Board-Level Discussion

“What you don’t know will hurt you.” That’s the topic of a recent SC Magazine article by CrowdStrike CEO George…

READ MORE
Effective Cybersecurity Requires A “Hygiene-First” Approach

Effective Cybersecurity Requires a “Hygiene-First” Approach

Although the frequency and damaging nature of breaches are realities today’s organizations must face, the announcement of what caused the…

READ MORE
The Right Endpoint Detection And Response (EDR) Can Mitigate Silent Failure

The Right Endpoint Detection and Response (EDR) Can Mitigate Silent Failure

In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris…

READ MORE
Webcast Offers Critical Factors For Effective Endpoint Detection And Response (EDR)

Webcast Offers Critical Factors for Effective Endpoint Detection and Response (EDR)

In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo