endpoint security: amplified

Final-Connect-Image.jpg

Cybersecurity for Special Events: 3 Threats to be Aware of

By Thom VanHorn, Sr. Director of Marketing at CounterTack -

The Super Bowl is only 5 days away.  Tom Brady and Bill Belichick are going for their record sixth victory in the big game.  If you’re not from New England, you’re probably rooting against the Patriots.  But if you are from New England…like I am, you’re no doubt hoping for them to cement their reputations as the greatest coach and quarterback of all time 😊

No matter who you are supporting, there is one group that we can all agree to root against – the hackers and criminals who use major events to perpetrate cyber-attacks.   Like most major events, the Super Bowl has historically resulted in an increase in attempts to defraud the public.  Phishing schemes increase, rogue Web sites appear, and hackers feast.  So as sports fans who will be visiting Super Bowl related Web sites – or maybe event journeying to Minneapolis, now is a good time to revisit common threats and take proactive action to minimize their risks.

Let’s look at 3 common cyber threats that typically accompany events like the Super Bowl.

Read More

Topics: malware, cybersecurity, endpoint security, CounterTack, EDR, endpoint detection and response, Email Phishing, Ransomware, IoT, advanced attacks, wifi, wi-fi

Top Three Cybersecurity Predictions for 2018

Mike Davis, CTO of CounterTack – As 2018 rapidly approaches, there is one thing we know for certain – cybersecurity will continue to dominate business, technology and mainstream media. The words “ransomware” “phishing” and “crypto miner” will be included in everyday conversations regardless of age, career or nationality. No longer are these terms confined to those in IT.  The following are my top three cybersecurity predictions for 2018.

Read More

Topics: Predictions, malware, cybersecurity, endpoint security, CounterTack, EDR, endpoint detection and response, Email Phishing, Ransomware, MSSP, IoT, advanced attacks, crypto miner, MDR, internet of things, crypto currency, bitcoin, fileless, zero day

Show Us the Way CryptoLocker!

Ransomware is a class of crimeware that locks down an infected system by preventing user’s access to their data stored locally or via accessible shared network drives. Access is only sometimes restored to the victim after a sum of money is transferred to a digitally remote blackmailer.

CryptoLocker is one of the latest variants in this family surfacing over the last few months has recently made some noise across the industry. Ransomware is one of the busiest (and most annoying) threats of 2013, and is experiencing another comeback tour so we decided it’s time to take a peek under the hood of the latest variant’s campaign to see what the author team is up to as of late and how different is the actual threat compared to the evasion techniques.

Read More

Topics: Cyber Crime, Cyber Security, malware, Cyber Attack, APT, cybersecurity, malware infection, malware analysis, Scout, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, in-progress attacks, Sean Bodmer

The Problem is the Detection Gap

The New York Times attack is all over the news this morning.  We’re lucky in some ways that this happened to the Times.  As their security beat reporter, Nicole Perlroth, noted in an interview on NPR this morning, as a media company, the NYT staff was more willing to talk publicly about what happened than most organizations would be.  We don’t often see coverage of advanced attacks in such detail, but the problem is widely known, if not widely understood. 

I applaud the Times for recognizing a possible threat, being proactive in starting to monitor its network, and following through with strong incident response.  However, the account noted that there was evidence that the attackers had been in the NYT network for months before perpetrating this attack.  Indeed, Perlroth reported that, “Investigators still do not know how hackers initially broke into The Times’ systems.” 

Read More

Topics: malware, Cyber Attack, Detection Gap

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all