Blog

Blog

The Benefits of Sharing Information for IT and Security

Confidentiality, Integrity and Availability – those are the three pillars of the CIA triad model for information security. Here's something you might not have known: in reverse order, those same pillars apply to IT Operations. Think about it. In a world of agility and enablement, the availability, integrity and confidentiality of the systems and...
Blog

Cerber 3 Ransomware Virus Is Already Here

AVG security researcher Jakub Kroustek has recently discovered tracks of the Cerber 3 ransomware virus marking encrypted files with the .cerber3 file extension. Unlike previous variants of Cerber, for which decryptors have been already developed, this variant contains fixes that prevent malware researchers from decrypting the files. Since this virus...
Blog

Going Beyond the Firewall to Tackle Today’s Cyberthreats

Firewalls are staples of network security, and for years, they’ve played a part in keeping networks safe by restricting both incoming and outgoing network traffic. Along with antivirus software, they are among the oldest and most widely used cybersecurity tools. But what role should firewalls play in 2016 and beyond? One thing is clear: even though...
Blog

Philadelphia Ransomware Allows Attackers to Offer "Mercy"

The Philadelphia ransomware enables attackers to offer "mercy" to their victims by choosing to decrypt their files for free. Attackers are likely distributing Philadelphia, which is a new version of Stampado, via the use of phishing emails disguised as payment notices from Brazil's Ministério da Fazenda or the Ministry of Finance. ...
Blog

Cybercrime and Money – Cause and Effect

“Should we fear hackers? Intention is at the heart of this discussion.” – Kevin Mitnick In cybercrime, truth is in the eye of the beholder. And if in any other research or business field it is somehow easy to define cause and consequence, in cybercrime it is not. Perhaps it is due to its complexity and multi-layered character that cybercrime has...
Blog

French Dark Web Posts Ad for Content Cleaner to be Paid in Stolen Goods

The French underground has posted a job ad for a dark web content "cleaner" who will be paid for their efforts in stolen goods. Trend Micro threat researcher Cedric Pernet came across the posting (which is written in French) after making other discoveries in a series of French underground marketplaces. According to the ad, the dark web marketplace...
Blog

Report claims national security was put at risk by the OPM data breach

A Congressional investigation into the devastating hack of the US government's Office of Personnel Management (OPM) has detailed shortcomings in the organisation's security and made recommendations for other federal departments to prevent the same from happening to them. The hefty 227-page report doesn't pull its punches about the seriousness of the...
Blog

Evolution of a 'Cameras Are Everywhere' Society

I remember when I first learned about some of the powerful spy satellites orbiting the earth. Some of the rumors stated the cameras on these machines were so accurate that they could read a car license plate from space. The idea that such technology existed back then was amazing. Now, some of the newer satellites are putting those early spy rumors...
Blog

Hutton Hotel Warns of Payment Card Breach That Lasted Over 3 Years

Hutton Hotel became the latest hospitality company to warn customers of a data breach that may have compromised their payment card details. The Nashville, Tenn.-based upscale hotel announced the security incident on Friday, stating it was notified of the potential breach by its payment processor. Subsequently, the company said it began an...
Blog

Yelp Will Award Up to $15K for Exploits Found in Bug Bounty Program

Crowd-sourced review service Yelp says it will award researchers up to 15,000 USD for reporting exploits as part of its newly public bug bounty program. The company successfully ran a private bug-bounty program for the past two years, during which it worked with private researchers and bug bounty hunters to fix as many as 100 vulnerabilities. But to...
Blog

The "Hows and Whys" of an Incident Management Call

Recently, I had a meeting with a potential customer who was looking to invest in Tripwire's portfolio. We got to talking about various aspects of information security—in particular, when companies discover, react to and investigate potential security breaches. The conversation took me back to when I worked in information security as a technical...
Blog

Mega Breach Strikes Rambler.ru with Leak of Nearly 100M User Records

Russian e-mail service provider Rambler.ru suffered a mega breach when someone leaked close to 100 million of its users' login credentials online. Data breach monitoring service LeakedSource said the 98,167,935 leaked credentials are real, information which someone allegedly stole in a hack against the "Russian version of Yahoo" during a security...
Blog

How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics

On 21 August, 2016, the International Olympic Committee (IOC) held the closing ceremony for the 2016 Summer Olympics at the Maracanã Stadium in Rio de Janeiro, Brazil. Hopefully, the celebration symbolized the close of a memorable fortnight during which athletes and spectators alike didn't get hacked and evaded the traps of computer criminals....
Blog

Security Hygiene for Dorm Life

Going back to school, especially college, is a fun time of year. One of the best experiences, by far, is living with other people in a dorm or private shared housing. You can make awesome friends, have amazing parties, and make excellent memories. It's important to note in these shared living situations that hygiene is incredibly important. You don...
Blog

Apple Issues Critical Updates for Spyware Flaws in Mac OS X, Safari

Apple issued critical updates for OS X Yosemite and El Capitan on Thursday to patch security vulnerabilities resembling those discovered on iOS 9.3.5 earlier this week. Dubbed Trident, the three zero-day vulnerabilities (CVE-2016-4655, CVE-2016-4656 and CVE-2016-4657) could allow an attacker to silently jailbreak an iOS device and spy on victims,...