endpoint security: amplified

Final-Connect-Image.jpg

Cybersecurity for Special Events: 3 Threats to be Aware of

By Thom VanHorn, Sr. Director of Marketing at CounterTack -

The Super Bowl is only 5 days away.  Tom Brady and Bill Belichick are going for their record sixth victory in the big game.  If you’re not from New England, you’re probably rooting against the Patriots.  But if you are from New England…like I am, you’re no doubt hoping for them to cement their reputations as the greatest coach and quarterback of all time 😊

No matter who you are supporting, there is one group that we can all agree to root against – the hackers and criminals who use major events to perpetrate cyber-attacks.   Like most major events, the Super Bowl has historically resulted in an increase in attempts to defraud the public.  Phishing schemes increase, rogue Web sites appear, and hackers feast.  So as sports fans who will be visiting Super Bowl related Web sites – or maybe event journeying to Minneapolis, now is a good time to revisit common threats and take proactive action to minimize their risks.

Let’s look at 3 common cyber threats that typically accompany events like the Super Bowl.

Read More

Topics: malware, cybersecurity, endpoint security, CounterTack, EDR, endpoint detection and response, Email Phishing, Ransomware, IoT, advanced attacks, wifi, wi-fi

Top Three Cybersecurity Predictions for 2018

Mike Davis, CTO of CounterTack – As 2018 rapidly approaches, there is one thing we know for certain – cybersecurity will continue to dominate business, technology and mainstream media. The words “ransomware” “phishing” and “crypto miner” will be included in everyday conversations regardless of age, career or nationality. No longer are these terms confined to those in IT.  The following are my top three cybersecurity predictions for 2018.

Read More

Topics: Predictions, malware, cybersecurity, endpoint security, CounterTack, EDR, endpoint detection and response, Email Phishing, Ransomware, MSSP, IoT, advanced attacks, crypto miner, MDR, internet of things, crypto currency, bitcoin, fileless, zero day

Notpetya, petya, its cousins, and What You Should Know About the Impact on Your Endpoints

A few days ago, NotPetya came into our purview, and left enterprises globally with many questions.

Read More

Topics: CounterTack, Ransomware, Petya, NotPetya, advanced attacks

CounterTack Announces Series D and Continued Growth


This week, CounterTack announced a Series D round of financingThis round of funding is led by new CounterTack investor Singtel Innov8 (venture capital arm of The Singtel Group), along with SAP National Security Services (SAP NS2 ™), also a new investor in CounterTack.

 

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, endpoint security solution, memory analysis

CounterTack’s Ransomware Protect Organizations Against WannaCry

The WannaCry ransomware started to hit companies worldwide this past Friday, setting off a wave a panic about what to do about it. The reality is this attack will continue to proliferate, and it will likely continue to command attention from CISOs to the boardroom to the media for the upcoming weeks. The attack was first reported to have started to hit companies in Europe and Asia this past Friday, and so far to-date, over 200,000 systems in 150 countries.

Read More

Topics: Zero-day Attack, Ransomware, wannacry, ransomware virus, ransomware attacks, ransomware protection

CryptoLocker: What's Old is New Again (in cyber years)


It’s been a few years since we have seen CryptoLocker on a regular basis, but now it seems to be making its rounds again via a new spam campaign. The new CryptoLocker variant has been around for many years, and has evolved over that time.

CryptoLocker used to be very popular back when the Zeus botnet was making its rounds. The way it worked was once a computer was infected with the Zeus malware, it would be used to push the CryptoLocker ransomware onto the machine.

Read More

Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, CryptoLOcker, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, Micah Graf, endpoint security solution, memory analysis

Your Ransomware attacks Choices: The Bad, The Ugly and The Mean

You can’t read the news these days without being blasted with yet another Ransomware story. Almost daily, there seems to be a new variant, a new name, and inevitably, new victims. The rise of Ransomware attacks shouldn’t come as a surprise, since its execution is quite simple and the demands on the victims are not onerous.

Ransomware  is not like an APT (Advanced Persistent Threat) - there is no need for long-term stealth operation, no need to explore the victim’s networks and resources, no need to steal credentials and no need to quietly and patiently exfiltrate sensitive data. With Ransomware, an exploit kit opens the door, and BANG, there it is, your PC is displaying a ransom note with detailed instructions on how to pay.
Read More

Topics: Cyber Attack, APT, Ransomware

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all