Blog

Blog

New SamSam Ransomware Version Involves Direct Attacker Involvement

A new variant of the SamSam ransomware family requires direct involvement from attackers in order to execute its malware payload. Uncovered by Malwarebytes, new versions of SamSam require attackers to execute a batch file that's responsible for loading up a .NET runner. They do so by manually entering a password as the file's command-line parameter...
Blog

The FBI's 10 Most-Wanted Black-Hat Hackers – #2

The State of Security's countdown of the FBI’s 10 most-wanted black-hat hackers is nearly over. Just two criminals remain. At number two is Evgeniy Mikhailovich Bogachev, the leader of a cybercrime ring responsible for writing and promulgating Gameover Zeus. On 22 August 2012, a federal grand jury in Nebraska indicted Bogachev on several charges,...
Blog

#TripwireBookClub – Serious Cryptography

Welcome to the second installment of #TripwireBookClub, where we look at Serious Cryptography, published by No Starch Press. This was a book I was interested in because I don’t spend a lot of time digging into crypto these days, and the book seemed like a good dive into the topic. Serious Cryptography: A Practical Introduction to Modern Encryption...
Blog

South Korean Cryptocurrency Exchange Loses $32M in Heist

A South Korean cryptocurrency exchange suffered a heist in which thieves made off with approximately $32 million in stolen assets. On 20 June, Bithumb disclosed the hack in a statement published to its website: We noticed that between last night and today early morning, about 35,000,000,000 KRW worth cryptocurrencies have been stolen. However, this...
Blog

Organizational Cybersecurity: At the Crossroads of Culture & GDPR

GDPR has been in effect since May 25th, 2018. The purpose of the regulation is twofold: to enhance the privacy of an EU citizen’s related information and to strengthen the powers of the data protection institutions and regulators to act against any organization breaches the new rules. But is GDPR alone the panacea for fighting cybercrime and data...
Blog

Women in Information Security: Susan Ballestero

Last time, I had the opportunity of speaking with Avi. Avi’s not a woman, but they’re a badass hacker with a natural intuition for cybersecurity that has been put to excellent use. This time, I had the pleasure of speaking with Susan Ballestero. She has unique experience with working in a security operations center and being an information security...
Blog

Google’s Newest Feature: Find My Home

The commoditization of personal data in recent years has created huge opportunities for anyone with the skills to collect, catalogue and correlate every aspect of our lives. For many years now, there has been a war between browser vendors and unscrupulous advertisers looking for tricks to uniquely identify users and track their movements across...
Blog

Banco de Chile Says Virus Infiltrated Its Computer Systems, Stole $10M

Chilean bank and financial services company Banco de Chile said that a virus infiltrated its computer systems and stole $10 million. On 9 June, Banco de Chile's general manager Eduardo Ebensperger provided some insight about the attack to La Tercera. A translation by Google is provided below: We found some strange transactions in the SWIFT system ...
Blog

5 Mobile Enterprise Data Concerns to Prepare for Now

Mobile platforms and the internet have brought about massive potential and real value to many companies. This evolution has made mobile enterprise systems an essential business function, becoming a top priority for any company serious about its growth. The ability of mobile technology to improve productivity and efficiency and drive greater ROI is...
Blog

8 Steps for a Successful DevOps Transition

Organizations stand to gain a lot from transitioning to a DevOps software development model. Switching to DevOps leads to quicker problem solving, increased employee engagement, and more time for innovation. That's assuming a transition is successful, however. Enterprises can run into various problems along the way, including inadequately measured...
Blog

2 Strategies to Tighten Your Cloud Security

Creating a thorough and effective security program is difficult enough when your data is stored on-premises. But most organizations and agencies straddle hybridized on-prem and cloud environments—or they’re cloud-native entirely. This complicates the role of cybersecurity teams who now need tools that can traverse multiple environments without...
Blog

Cybersecurity: Protecting All the Endpoints

Network security is an issue that is increasingly important as businesses and even households shift more workflow processes and key tasks to the network and into the cloud. While some users may find it a challenge to protect even a single digital device, keeping an entire network secure can be a tall order for even the most tech-savvy users. From...
Blog

FBI Arrests 74 in Global Takedown of Business Email Compromise Scammers

Federal authorities have arrested dozens of alleged fraudsters in an international takedown of Business Email Compromise (BEC) schemes. According to the Department of Justice, a total of 74 individuals were arrested, including 43 in the US, 29 in Nigeria, and three in Canada, Mauritius and Poland. The operation – dubbed Operation Wire Wire – was...
Blog

What Is Integrity Management?

If you’ve been in information security for a while, you’ve likely had some experience with file integrity monitoring (FIM). It’s a capability with a long history, going back to the original open-source Tripwire tool for monitoring file hashes. And FIM has staying power. It’s still around, and there are still new deployments. There aren’t a lot of...