Social Engineering: First Salvo of a Hack

When most people think of computer hacking the natural inclination is to picture a socially awkward early twenty-something. He’s locked in his basement somewhere pecking away at a keyboard in the dark. While this assumption may have some basis in the truth, all too often modern hacking involves a much … Read More

Meltdown and Spectre Threat Continues

The roller-coaster that is Meltdown and Spectre has been a unique ride, and doesn’t appear to over. But there is more to take away from this story than a prolific vulnerability. The security world stood in shock and awe early this year as news of Spectre and Meltdown began circulating.  … Read More

North Korea Turns to Cryptocurrency

The government of North Korea has, over the last few years, been largely cut off from the global economy due to their civil rights abuses, intercontinental ballistic missile launches, and nuclear weapons development. To attempt to feed their starving population and maintain control, they’ve now turned to hacking cryptocurrency. The … Read More

Zyklon Malware Resurgence

FireEye recently reported a resurgence of the Zyklon HTTP malware, which leverages three new vulnerabilities in Microsoft Office.  This sophisticated malware, originally detected in early 2016, has been observed targeting telecommunication, insurance, and financial service industries through spear phishing attacks.  Once a host has been infected, Zyklon conducts command and … Read More

Lebanese Hacking Continues

A state-sponsored hacking group called the Dark Caracal, linked to the Lebanese government, has an ongoing attack effecting desktops and Android. They have been found to be engaging in cyber espionage and data theft against 21 countries or more.  They have stolen hundreds of gigabytes of personal data. Their attacks … Read More

Recovering from BitPaymer Ransomware – Part 2

This is part two of a special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Part one:   The BitPaymer Infected Server: The client presented after the expiration for the ransom demand and well after the malware had spread to … Read More

ICO Warning: 10% of Proceeds Hacked

Ernst & Young conducted a study of 372 initial coin offerings put out in 2017 and tracked the ICO funding patterns.  Last year investors and coin fans pumped around $3.7 billion into ICOs, but EY found that around $400 million of that money ended up in the hands of hackers.   … Read More

Hackers Expose Lack of Internal Controls

State sponsored Lebanese hackers recently left hundreds of gigabytes of stolen data exposed to the open web. While this headline is notable on its own, it highlights an even larger problem. One of the biggest issues seen in almost every household and an alarming number of businesses is the lack … Read More

Recovering from BitPaymer Ransomware – Part 1

This is part one of a two-part special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Ransomware is a malicious type of software that infects a computer by writing code that encrypts or blocks access to the files on the computer … Read More

Penetration Testing for Small to Medium Businesses

Your car’s check engine light just came on.  You hurry it to the mechanic, fearing the worst.  It doesn’t look good.  He says you need a supercharger, and you need it now. We have all been to “this” mechanic before, or we have at least heard the stories – it … Read More