ransom networking ransomware

Understanding the Progression of a Ransomware Attack

Everyone should be familiar with ransomware and its impact on businesses by now. But while you may understand the very basics of ransomware, you can’t really protect your organization until you are ...
Security Boulevard
MITRE Splunk DLL sideloading ransomware Iran cybersecurity attack Security

Splunk: Cybercriminals Use These Types of TTPs

A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...
Security Boulevard
SBOMs, software, Lacework vulnerability management Cymulate decentralized supply

Cymulate Identifies Cyberattack Technique That Evades EDR Platforms

Cymulate, a cybersecurity posture assessment platform provider, shared a technique, dubbed Blindside, that enables malware to evade some endpoint detection and response (EDR) platforms and other monitoring/control systems. Mike DeNapoli, director of ...
Security Boulevard

I wanted to like this report, but … – Fortinet Global Threat Landscape Report 1H 2022

The Thursday edition of ‘Too Long; Did Read’ focuses on Fortinet’s Global Threat Landscape Report for the first half of 2022. In my experience, 7-8 weeks to go from data collection to ...
Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

PacketStreamer is an open source tool that captures network traffic from multiple remote sources concurrently and aggregates the data into a single pcap log file. It is written in golang and supports network ...
ransomware Babuk Locker

Defending Against Modern Ransomware Tactics

Ransomware gangs are continuing to evolve new tactics and techniques, and organizations need to be better prepared to defend against them in 2022. In the business of extorting money from victims, bad ...
Security Boulevard
Why Understanding Cyber Criminals Behavior and Tools is Vital

Why Understanding Cyber Criminals Behavior and Tools is Vital

By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created. The post Why Understanding Cyber Criminals Behavior and Tools is Vital appeared first ...

Countering Network Resident Threats

By Richard Bejtlich, Principal Security Strategist, Corelight Vendors often claim that their products or services counter, mitigate, or otherwise affect “nation state threats.” When I worked as a director of incident response ...