by Liz Bush | Sep 18, 2018 | Blog, Cybersecurity, Threat Intelligence
The Top 5 Cyberthreats to the Retail Industry and How to Prevent Them POSTED BY LIZ BUSH Macy’s, Adidas, Panera Bread and Chili’s are just a few of the retailers and merchants who have fallen victim to cyberattacks in the last few months, putting payment card data and...
by Liz Bush | Sep 11, 2018 | Blog, Cybersecurity
Spear phishing is an Equal Opportunity Threat POSTED BY LIZ BUSH Unless you’ve cut yourself off from all media over the last two years, you’re probably familiar with the hack of the Democratic National Committee (DNC) during the 2016 Presidential election. What you...
by Nir Yosha | Sep 5, 2018 | Blog, Cybersecurity, Threat Intelligence
Clustering IOCs POSTED BY NIR YOSHA There is something so absolutely freeing about staring at the stars. The milky way can be seen without a telescope. However, most stars are not visible to the naked eye. Star clusters can be discovered by their gravitational...
by Liz Bush | Aug 28, 2018 | Blog, Cybersecurity, Threat Intelligence
Mitigating Risk in the Healthcare Industry POSTED BY LIZ BUSH SingHealth. UnityPoint Health. LabCorp. Blue Springs Family Care. Sunspire. Alive Hospice. Cass Regional Medical Center. A quick Google search reveals that in the month of July alone, each of these...
by Ryan Trost | Aug 21, 2018 | Blog, Cybersecurity, Threat Intelligence
Attack Attribution POSTED BY RYAN TROST This is the third and final blog in my series on victimology. Let’s return to our previous investigation of the robertwanger [at] aol.com spear phish attacks. Now that we have a relatively decent baseline, we can start to...
by Ryan Trost | Aug 15, 2018 | Blog, Cybersecurity, Threat Intelligence
Timeline Analysis to Identify Campaign Attacks POSTED BY RYAN TROST Building from our previous spearphish investigation, let’s continue to dissect the robertwanger [at] aol.com spearphish attacks. Hypothesis – The six targeted spearphish attacks are split into...