endpoint security: amplified

Final-Connect-Image.jpg

CounterTack Announces Series D and Continued Growth


This week, CounterTack announced a Series D round of financingThis round of funding is led by new CounterTack investor Singtel Innov8 (venture capital arm of The Singtel Group), along with SAP National Security Services (SAP NS2 ™), also a new investor in CounterTack.

 

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, endpoint security solution, memory analysis

CryptoLocker: What's Old is New Again (in cyber years)


It’s been a few years since we have seen CryptoLocker on a regular basis, but now it seems to be making its rounds again via a new spam campaign. The new CryptoLocker variant has been around for many years, and has evolved over that time.

CryptoLocker used to be very popular back when the Zeus botnet was making its rounds. The way it worked was once a computer was infected with the Zeus malware, it would be used to push the CryptoLocker ransomware onto the machine.

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, CryptoLOcker, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, Micah Graf, endpoint security solution, memory analysis

Why Malware Security Alone Won’t Work Today

Much like the paperless office, which we talked about for years but then just seemed to happen one fine day, our recent chant that malware security program is dead will also just seem to happen one fine day. But we are not quite there yet. Reason: we are looking for the next generation endpoint malware security technology to replace the once trusty AV but comprehensive protection is a long, long ways away.

Malware Security Issues

Read More

Topics: malware analysis, malware attack, malware security

Critical Infrastructure of Malware Security

In last week’s blog, we discussed why critical malware security infrastructure is a prime target. To recap, targeted malware attack to critical infrastructure will continue to occur solely based on the political and economic ramifications that ensue following the incident. Political, economic and financial drivers are all motivating factors behind attacks of this nature. 

Truth #3: No Organization – critical infrastructure providers included – can keep up with the onslaught of new malware attack and APTS. 

Read More

Topics: malware analysis, Critical Infrastructure, malware attack, malware security

Endpoint Security Makes Quantum Shift: Part IV - Resolution

Malware Analysis Process Matters

Gartner has been the most vocal about the need for a process shift, advocating what it calls an “adaptive malware security architecture.” The idea is to balance efforts among attempting to predict when a breach will occur, prevent­ing the ones you can, detecting what a suc­cessful attacker has done on the endpoint, and ultimately responding to the attack in some way. You need to be doing all of these, all the time, with a variety of technologies, so you can respond appropriately.

“How you protect yourself from a shotgun blast is very different than how you protect yourself from a sniper’s bullet,” says Neal Mac­Donald, VP distinguished analyst at Gartner.

Let’s look at a real-world example of why you need change now, before you get stuck in the quicksand of a disastrous endpoint breach your prevention tools missed.

Read More

Topics: Cyber Security, malware analysis, endpoint security, malware attack, malware security

Endpoint Security Makes Quantum Shift: Part II - Up The Stack

Given the endless game of whack-a-mole that is IT malware security, it makes sense that, as anti-virus effectiveness waned, malware analysis software vendors moved to network-level prevention. The idea: We won’t need to scramble to keep malware attack off endpoints if we can block the exploit or malware security at the email server or web gateway.

From network-based anomaly detection to advanced sandboxing, these tools flooded the market and worked great — for a while. As they always do, attackers adjusted, adding new techniques, such as encryption and fast-flux DNS. It is an arms race, after all. Some malware attackers started to obscure their exploits, hiding in plain sight by blending with innocuous network traffic. Others simply stopped aiming at the network. No network traffic means no results from network detection tools.effectiveness waned, malware security software vendors moved to network-level prevention. The idea: We won’t need to scramble to keep malware off endpoints if we can block the exploit or malware security at the email server or web gateway.

Read More

Topics: malware analysis, endpoint security, malware attack, malware security

CounterTack is Now a Gartner Cool Vendor!

Its not everyday that you get to say that you have been selected as a Gartner Cool Vendor. But today, for CounterTack, we can! Gartner has selected CounterTack as one of only five featured vendors in the Garnter Cool Vendors for Application and Endpoint Security 2014 report. 

Read More

Topics: cybersecurity, malware analysis, endpoint security, CounterTack, Gartner, Gartner Cool Vendor

Show Us the Way CryptoLocker!

Ransomware is a class of crimeware that locks down an infected system by preventing user’s access to their data stored locally or via accessible shared network drives. Access is only sometimes restored to the victim after a sum of money is transferred to a digitally remote blackmailer.

CryptoLocker is one of the latest variants in this family surfacing over the last few months has recently made some noise across the industry. Ransomware is one of the busiest (and most annoying) threats of 2013, and is experiencing another comeback tour so we decided it’s time to take a peek under the hood of the latest variant’s campaign to see what the author team is up to as of late and how different is the actual threat compared to the evasion techniques.

Read More

Topics: Cyber Crime, Cyber Security, malware, Cyber Attack, APT, cybersecurity, malware infection, malware analysis, Scout, Sentinel, endpoint security, CounterTack, Breaches, Zero-day Attack, in-progress attacks, Sean Bodmer

You Don't Need to Break Your Toys Because They 'Don't Work'

Sometimes you can equate certain situations to others, i.e., actions you may take in your professional life might mimic actions you took as a child. 

Read More

Topics: cybersecurity, Tom Bain, malware infection, malware analysis, Scout, Sentinel, automated security intelligence, automated security, endpoint security, CounterTack

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all