Security Analytics

Analytics and Intelligence

Avast tracks down Tempting Cedar Spyware

Avast tracks down Tempting Cedar Spyware

/
A few months ago, one of our customers contacted us regarding strange messages he received on Facebook Messenger. The messages came from fake Facebook profiles belonging to attractive, but fictitious women. These ...
VASCo Face-ID demo

As Facial Recognition Accelerates, VASCO Responds with a Face ID SDK

/
Face ID is fast becoming a differentiator for organizations that want to provide a frictionless mobile experience. While biometric authentication remains the exception and not yet the rule, the analyst community strongly ...
What the Meuller/Russia Indictment Means for Cybersecurity

What the Meuller/Russia Indictment Means for Cybersecurity

/
On Feb. 16, a federal grand jury in Washington, D.C. returned an indictment against 13 Russian citizens and three Russian companies for a scheme involving information warfare against the political institutions of ...
Encryption 101: a malware analyst’s primer

Encryption 101: a malware analyst’s primer

/
A primer on encryption mechanisms and how they are exploited by malware authors, including an introduction to encryption and the main methods used to encrypt ransomware. Categories: Threat analysis Tags: encryptionransomware (Read ...

APT37 (Reaper): The Overlooked North Korean Actor

/
On Feb. 2, 2018, we published a blog detailing the use of an Adobe Flash zero-day vulnerability (CVE-2018-4878) by a suspected North Korean cyber espionage group that we now track as APT37 ...

Applying Cross-Channel Data to Improve Fraud Detection

/
Risk-based authentication leverages machine learning to consume third-party fraud data and business intelligence to predict fraud risk more accurately and allow good customers to pass unhindered. Learn how one organization was able ...
CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques
Used Post-Exploitation and Pre-Mining

CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining

/
Introduction FireEye researchers recently observed threat actors abusing CVE-2017-10271 to deliver various cryptocurrency miners. CVE-2017-10271 is a known input validation vulnerability that exists in the WebLogic Server Security Service (WLS Security) in ...

Account Takeover Surge Results from Mass Data Breaches and Phishing

/
Account takeover attacks are increasing due to mass data breaches and phishing attacks which have exposed billions of usernames, email addresses and passwords. Learn more about this growing threat and why automated ...
Integrate Your Ticketing System into Database Security to Prevent DBA Privilege Abuse

Integrate Your Ticketing System into Database Security to Prevent DBA Privilege Abuse

/
Many of the recent high-profile data security breaches were made by trusted insiders. They are often database administrators (DBAs) who are highly privileged and trusted insiders with access to sensitive data. In ...
Loading...