Category: Uncategorized


As of this writing, the government shutdown of 2019 is the longest ever in America. The only good news about this situation is that, with each passing day, a new group of people in the country seems to rediscover just how essential government services are, now that they’re unavailable. Continue reading

We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed attacks on specific targets with the intention to compromise their systems and gain information from or about that target. While the targets may be anyone or anything—a person, business, or other organization—APTs are often associated with government or military operations, as they tend to be the organizations with the resources necessary to conduct such an attack. Starting with Mandiant’s APT1 report in 2013, there’s been a continuous stream of exposure of nation-state hacking at scale. Continue reading

After a short hiatus in early January, the Fallout exploit kit is back in business again with some new features for the new year. During its absence, we noticed an increase in RIG EK campaigns, perhaps to fill that temporary void. Continue reading

We recently found two malicious apps on Google Play that drop wide-reaching banking malware. The two apps were disguised as useful tools, simply named Currency Converter and BatterySaverMobi. Google has confirmed that both these apps are no longer on the Play Store. Continue reading

Media coverage of cybersecurity breaches would lead us to believe that sophisticated, targeted attacks are reserved for well-known enterprise organizations. Searching the Internet for data breaches of this decade yields names such as Equifax, Target, eBay, Home Depot, Sony, JP Morgan Chase and Anthem, just to name a few. Attacks against these mammoth enterprises may lead small and medium-sized businesses (SMBs) to believe their size protects them from sophisticated and targeted attacks. In fact, a Paychex report found that a startling 68 percent of SMB owners are not worried about being hacked. Continue reading

As an ever-increasing number of organizations of any size and in any industry can attest, cybersecurity incidents and breaches can leave significant organizational damage and business disruption in their wake. It is critical, therefore, to have experts in the relevant areas identified and standing by: forensic cyber expertise and relevant legal expertise — as these are at the forefront of those needs. Continue reading

While ransomware is not new, major attacks like WannaCry, Petya/NotPetya and, more recently, TrickBot have shown that existing prevention methods have become ineffective at preventing advanced ransomware attacks. Attackers have evolved their approach and use of malware to become more sophisticated, automated, targeted and highly evasive. Continue reading

Adversaries look for fast and easy ways to steal data. Among the many techniques in their playbooks, using scripts is a quickly growing trend. Why? It requires minimum human intervention, automates manual steps, and gets them to their malicious goals faster. Continue reading

Health Sciences North is still experiencing technical difficulties with their IT systems due to a computer virus. Continue reading