endpoint security: amplified

Final-Connect-Image.jpg

Notpetya, petya, its cousins, and What You Should Know About the Impact on Your Endpoints

A few days ago, NotPetya came into our purview, and left enterprises globally with many questions.

Read More

Topics: CounterTack, Ransomware, Petya, NotPetya, advanced attacks

CounterTack Announces Series D and Continued Growth


This week, CounterTack announced a Series D round of financingThis round of funding is led by new CounterTack investor Singtel Innov8 (venture capital arm of The Singtel Group), along with SAP National Security Services (SAP NS2 ™), also a new investor in CounterTack.

 

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, endpoint security solution, memory analysis

CryptoLocker: What's Old is New Again (in cyber years)


It’s been a few years since we have seen CryptoLocker on a regular basis, but now it seems to be making its rounds again via a new spam campaign. The new CryptoLocker variant has been around for many years, and has evolved over that time.

CryptoLocker used to be very popular back when the Zeus botnet was making its rounds. The way it worked was once a computer was infected with the Zeus malware, it would be used to push the CryptoLocker ransomware onto the machine.

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, CryptoLOcker, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, Micah Graf, endpoint security solution, memory analysis

Take your SMB cyber program from “I hope,” to “I know”

As a small business or mid-sized organization, cybersecurity can mean very different things. Most small businesses have less resources available to deal with threats.

Read More

Topics: Tom Bain, CounterTack, EDR, endpoint detection and response, SMB, SMB Security, ThreatScan PRO, on-demand endpoint scanning

A Case for Security Prioritization in Retail


I was shoppping with my daughter the other night for indoor soccer socks at a major sporting goods retailer here in Massachusetts. As we rolled up to the register with bright pink and purple options, I noticed something at checkout - the retailer was not ready for chip and pin credit cards. 

As I swiped my chip and pin credit card, I got to thinking...there are cyber risks everywhere, during every transaction, before and after every transaction, at any store, any company, coffee shop, airplane, airport, organization you visit...but back to the example here. 

Read More

Topics: Cyber Security, APT, CounterTack, Breaches, Breach, retail data breach, data breach, EDR, chip and pin, retail security

Detecting and Remediating Against File Distribution Attacks

Enterprise teams have varying means to some degree, of how they “see” attacks. There is often incongruence between what events they can detect, what their intelligence means, and the potential impact of an attack. 

At CounterTack, we are developing new technologies to help customers better detect and understand their threat tolerance. We are innovating methods to help customers improve security response by contextualizing threat impact into actionable intelligence.

Read More

Topics: cybersecurity, Sentinel, CounterTack, EDR, endpoint detection and response, Shamoon, file distribution attacks, Kirby Kuehl, cyber attacks

The Next Generation Endpoint Is Truly Here - Malware Security

The RSA Conference was an interesting experience, particularly for those in the endpoint malware security market, or those attempting to break into this emerging market. It seems everyone at this point has some type of endpoint play, regardless of their technology heritage, or prior security focus.

It was at the America’s Growth Capital conference, a simultaneous gathering of investors and security types, that perhaps one of the more interesting panels took place, albeit, the final panel session of the day. With 1 billion endpoints in need of help, its clear this is the hottest market across the broadening security industry. 

Malware security Issues

Read More

Topics: Cyber Attack, APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, Neal Creighton, data breach, Big Data Security, EDR, Big Data EDR, RSA Conference 2015, endpoint detection and response, AGC

When Zombies Attack - Hacker Halted and CISO Forum Wrap-up

It’s only so often that you can attend a conference with the dominant theme being the Zombie Apocalypse.

And no more fitting location than Atlanta, where it all started for the ‘Walking Dead.’ Yes, the walkers took Atlanta first and swarmed in an outward fashion from there to swarm the rest of the world for complete domination.

Read More

Topics: APT, cybersecurity, Tom Bain, Sentinel, endpoint security, CounterTack, cybersecurity research, Hacker Halted, CISO Forum 2014, Michael A. Davis, Zombies, EC Council, Hacker Halted 2014, CISO Forum

West Point Focuses Efforts on Cyber Defense with the Army Cyber Institute

CounterTack would like congratulate the Army Cyber Institute (ACI) at West Point on its ribbon cutting ceremony on October 3, 2014. The ACI’s mission is an important one for our country and they have assembled an incredible team led by Colonel Greg Conti and Chair LTG (R) Rhett Hernandez. I was fortunate enough to be present for the ribbon cutting on a beautiful, sunny day along the Hudson River at West Point. 

Read More

Topics: Cyber Defense, APT, cybersecurity, endpoint security, CounterTack, Breaches, Security Intelligence, Neal Creighton, Gartner Cool Vendor, Army Cyber Institute, General Rhett Hernandez, Colonel Greg Conti, U.S. Army

The First Federally-Funded Cybersecurity Center of Excellence

This news flew under the radar for the most part, and I neglected to pick this up in a timely fashion through my feeds. But MITRE announced that it was awareded $29M to start the first federall-funded cybersecurity of excellence of its kind. Reports also state that this initiative could receive over $5B over the next 25 years. 

Read More

Topics: Cyber Defense, Network Security, APT, cybersecurity, Tom Bain, endpoint security, CounterTack, Security Intelligence, cybersecurity research, cybersecurity R&D

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all