Blog

Blog

How to Approach Cyber Security for Industrial Control Systems

Today's industrial control systems (ICS) face an array of digital threats. Two in particular stand out. On the one hand, digital attackers are increasingly targeting and succeeding in gaining unauthorized access to industrial organizations. Some actors use malware, while others resort to spear-phishing (or whaling) and other social engineering...
Blog

Casino Rama Resort Says Hackers Stole Data in Digital Attack

Casino Rama Resort says hackers stole information pertaining to its customers, employees, and vendors in a digital attack. On 4 November, the casino based in Rama, Ontario first learned of a security incident that affected one of its networks. Its internal teams began working with digital security experts to figure out what happened. Following their...
Blog

Tips on Keeping Your Mobile Life Secure

Security has always been the matter of heated debates between staunch adherents and implacable adversaries of both Android and iOS. With the advent of Google’s new phone, Pixel, the heat hasn’t subsided. On the contrary, it rose to a whole new level. Right now, Pixel is under close scrutiny of active web surfers and online security gurus as per...
Blog

BEC Scammers Building Rapport with Victims to Improve Chances of Success

Business email compromise (BEC) scammers are now focusing on building rapport with victims to increase their chances of success. Just as a little background, a BEC scam begins with an actor launching spear-phishing or whaling attacks against a senior, C-level executive. If the attack proves successful, the actor spends some time researching how the...
Blog

Women in Information Security: Isly

Women in information security, being a minority, deserve a spotlight. Previously, I've interviewed Tiberius Hefflin, a Scottish security analyst who is currently working in the United States, and Tracy Maleeff, a woman who went from library sciences to infosec, who's now a host of the PVCSec podcast, and who runs her own infosec business. Recent...
Blog

Shadow Brokers Leaks Dilemma – History of Events Explained

In February of 2015, researchers at Kaspersky Lab disclosed the existence of a sophisticated cyber-attack group that's been in operation since early 2001, and targeted almost every industry and foreign countries with its zero-day malware. Kaspersky called this threat actor the Equation Group because of its love for encryption algorithms and the...
Blog

The World of the Technical Support Scam

According to new research published by Microsoft last month, one in three users fell victim to a tech support scam in the last year. One in five followed up on a suspicious interaction by downloading software or visiting a fraudulent website, while nearly one in ten lost money. The classic scam The traditional form of a tech support scam has been...
Blog

Scam Says LinkedIn Team Needs Your Photo ID for Account Verification

Against many experts' advice, we as users tend to overshare information about ourselves on social media. Doing so makes the job of a bad actor so much easier. Depending on the content of the shared details, an actor can leverage the information to commit identity theft. Alternatively, they can abuse it to conduct targeted phishing campaigns known as...
Blog

VERT Threat Alert: November 2016 Patch Tuesday Analysis

Today’s VERT Alert addresses 14 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-698 on Wednesday, November 9th. Ease of Use (published exploits) to Risk Table Automated Exploit ...
Blog

Netflix Patches Vulnerability That Allowed Account Takeover Via Voicemail

An Austrian security researcher recently unveiled a vulnerability affecting Netflix that allowed attackers to takeover user accounts. In a blog post published on Monday, the researcher – known as ‘Slashcrypto’ – explained the attack works when a victim’s voicemail can be hacked to bypass the password reset function of Netflix. “… When a user wanted...
Blog

October 2016: The Month in Ransomware

Just like in September, the cyber extortion epidemic keeps mutating. The crooks at the helm of ransomware campaigns are constantly experimenting with the geography of their attacks, intimidation tactics, data locking mechanisms, and payment channels. Learn how this underground ecosystem evolved last month and whether the security industry is ready...
Blog

Pentest Toolbox Additions 2016

I've added some handy tools to my pentest toolbox this year. You'll find a short description of each with links to more information below. Whether red or blue team, you'll want to know what these tools can do. Password Spraying Password spraying is guessing a few passwords against a large list of users in order to avoid account lockout. You would...
Blog

Sextortionist Demands 5,000 Euros After Ensnaring Victim in Skype Scam

The webcam is a cherished tool of digital extortionists. With the help of a remote access trojan (RAT) like BlackShades or Dark Comet, a bad actor can "slave" a user's computer, assume control over their webcam, record the unknowing individual, and leverage that footage to get what they want from their victim. Those demands could consist of money,...
Blog

Bizarro Sundown Exploit Kit Distributing Locky Ransomware via ShadowGate

The Bizarro Sundown exploit kit is spreading two versions of Locky ransomware via the still-active ShadowGate malvertising campaign. In October, Trend Micro spotted two versions of Bizarro Sundown, a modification of the earlier Sundown exploit kit which rose to prominence with RIG following Neutrino's demise. The first iteration reared its ugly head...