Social Engineering: First Salvo of a Hack

When most people think of computer hacking the natural inclination is to picture a socially awkward early twenty-something. He’s locked in his basement somewhere pecking away at a keyboard in the dark. While this assumption may have some basis in the truth, all too often modern hacking involves a much … Read More

If You Think Cryptocurrency Is Safe, Think Again

A research paper submitted by Ernst & Young states that hackers stole about $400 million from 372 initial coin offerings over the last two years.  There are several alarming elements to this. For those unfamiliar with how widespread cryptocurrency has already become, it may come as shocking to learn there … Read More

Meltdown and Spectre Threat Continues

The roller-coaster that is Meltdown and Spectre has been a unique ride, and doesn’t appear to over. But there is more to take away from this story than a prolific vulnerability. The security world stood in shock and awe early this year as news of Spectre and Meltdown began circulating.  … Read More

North Korea Turns to Cryptocurrency

The government of North Korea has, over the last few years, been largely cut off from the global economy due to their civil rights abuses, intercontinental ballistic missile launches, and nuclear weapons development. To attempt to feed their starving population and maintain control, they’ve now turned to hacking cryptocurrency. The … Read More

Zyklon Malware Resurgence

FireEye recently reported a resurgence of the Zyklon HTTP malware, which leverages three new vulnerabilities in Microsoft Office.  This sophisticated malware, originally detected in early 2016, has been observed targeting telecommunication, insurance, and financial service industries through spear phishing attacks.  Once a host has been infected, Zyklon conducts command and … Read More

Lebanese Hacking Continues

A state-sponsored hacking group called the Dark Caracal, linked to the Lebanese government, has an ongoing attack effecting desktops and Android. They have been found to be engaging in cyber espionage and data theft against 21 countries or more.  They have stolen hundreds of gigabytes of personal data. Their attacks … Read More

Recovering from BitPaymer Ransomware – Part 2

This is part two of a special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Part one:   The BitPaymer Infected Server: The client presented after the expiration for the ransom demand and well after the malware had spread to … Read More

ICO Warning: 10% of Proceeds Hacked

Ernst & Young conducted a study of 372 initial coin offerings put out in 2017 and tracked the ICO funding patterns.  Last year investors and coin fans pumped around $3.7 billion into ICOs, but EY found that around $400 million of that money ended up in the hands of hackers.   … Read More

Hackers Expose Lack of Internal Controls

State sponsored Lebanese hackers recently left hundreds of gigabytes of stolen data exposed to the open web. While this headline is notable on its own, it highlights an even larger problem. One of the biggest issues seen in almost every household and an alarming number of businesses is the lack … Read More

Recovering from BitPaymer Ransomware – Part 1

This is part one of a two-part special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Ransomware is a malicious type of software that infects a computer by writing code that encrypts or blocks access to the files on the computer … Read More