endpoint security: amplified

Final-Connect-Image.jpg

Cyber Resiliency is a Message That Resonates

I've been attending the Inbound Conference, hosted by HubSpot this week, to brush up on a few things in my discipline (Marketing). Speakers present new Marketing strategies, and mainly inspiration for Marketers to find truly different ways to communicate to audiences. Every session focuses on specific tactics, like blogging or email or telling better stories.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, threat detection, Zero-day Attack, Security Intelligence, Breach, Gartner Cool Vendor

Show Us the Way CryptoLocker!

Ransomware is a class of crimeware that locks down an infected system by preventing user’s access to their data stored locally or via accessible shared network drives. Access is only sometimes restored to the victim after a sum of money is transferred to a digitally remote blackmailer.

CryptoLocker is one of the latest variants in this family surfacing over the last few months has recently made some noise across the industry. Ransomware is one of the busiest (and most annoying) threats of 2013, and is experiencing another comeback tour so we decided it’s time to take a peek under the hood of the latest variant’s campaign to see what the author team is up to as of late and how different is the actual threat compared to the evasion techniques.

Read More

Topics: Cyber Crime, Cyber Security, malware, Cyber Attack, APT, cybersecurity, malware infection, malware analysis, Scout, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, in-progress attacks, Sean Bodmer

The Pitfalls Behind And Ahead

The pace of advisories and reports surrounding new zer0day activity seems to be accelerating at an alarming rate in 2013. Growing numbers have been seen in the wild exploiting victims and gaining beachheads within enterprises around the world. Meanwhile, as a noted in a recent New York Times article, which highlighted the statistics of crimeware detection and prevention among the world’s top 45 antivirus engines commercially available, the cyber security industry has been slow to adapt. To illuminate some of the mystery behind some of the tools and techniques that makes executable detections more difficult than they used to be, it helps to examine a small chip off of the proverbial iceberg of evasion techniques to make the topic more digestible.

In the book Hacking Exposed – Malware and Rootkits, my co-authors and I discussed many of these evasion techniques and other tools such as crypters, binders, packers, polymorphism, and several other common methods that bolster the survivability of a malicious executable. Almost all of these tactics are incorporated by persistent threats in order to evade detection by most commercially available antivirus or other security products. To understand these methods and related behaviors, one must first examine the motive behind them.

Read More

Topics: Cyber Crime, Cyber Attack, APT, Detecting in-progress attack, in-progress attacks, VirusTotal, Anubis, Broad Crypter

Dissecting Project Blitzkrieg

Reports of a massive, looming cyber attack – coined Project Blitzkrieg – has dominated headlines following the recent release of a new McAfee Labs study.

According to the report, malware has been lying dormant in 30 leading U.S. financial services organizations – including Fidelity, E*Trade, Charles Schwab, PayPal, Citibank, Wachovia, Wells Fargo, Capital One, Navy Federal Credit Union and others – and will be activated by the Spring of next year. The report goes on to say that “the project appears to be moving forward as planned.”

Read More

Topics: Cyber Crime, Cyber Security, malware, Cyber Attack, Research

Sean Bodmer, Chief Security Researcher, CounterTack

We are pleased to announce Sean Bodmer as Chief Security Researcher at Countertack. Sean joins us from Damballa where he was also the senior security researcher. We believe that Sean will greatly enhance our mission in delivering “next generation” host intrusion detection & prevention.

A highly visible authority on the frontlines of cyber security, Bodmer brings a unique background and industry perspective to advanced threat detection and analysis to CounterTack.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Predictions, Cyber Attack, Cyber attack intelligence, APT, Zero-day Attack, Breach

A New Kind of Warfare: Should Enterprise Follow Suit?

The New York Times posted a thought-provoking editorial piece this weekend on our nation’s cyber security efforts and the intensifying focus the government is taking on developing offensive capabilities to combat our cyber adversaries – hackers, criminals and foreign governments, mainly China. But, the piece argues, we’re moving into potentially dangerous territory.

Furthermore, this notion of developing capabilities to “strike back” against cyber attackers has moved beyond the government sector to the enterprise. In recent months, more than a few security startups have made headlines with their bold statements on this controversial issue, urging corporations to take matters into their own hands as “cyber vigilantes,” taking proactive strikes against their attackers’ infrastructure.

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack

What We’re Reading Right Now

A number of recent industry articles have caught our attention lately – all highlighting the serious inadequacies of current security approaches and underscoring the need for fundamental and far-reaching changes. Here are a few of our must-reads for the week:

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Attack, APT

A Good Pair of Running Shoes?

….two friends are walking through the woods. As they round a corner on the trail, they spot a big, agitated grizzly bear getting ready to charge. One of the friends grabs his running shoes out of his pack and starts to put them on. The other says to him, ‘Are you crazy, what are you doing? You can’t outrun a bear!’ His friend says, ‘I don’t have to outrun the bear… I just have to outrun you!’

Read More

Topics: Cyber Crime, Cyber Defense, Cyber Security, Cyber Attack

2012 Security Predictions from CounterTack

It’s that time of year again! Time for the 2012 predictions – and the security industry is chock-full of them. They’ve all been written before, but we thought we’d highlight a few of our favorites, and of course, we couldn’t resist tossing a few of our own into the mix. Do you agree, disagree or have your own security predictions to share? Leave us a comment and let us know what you think.

Read More

Topics: Cyber Crime, Cyber Defense, Mobile Security, Predictions, Our Thoughts, M&A

Subscribe to Email Updates

Posts by Topic

see all