hackers evil Swarmshop Security as Bad Guy Myth

An Inside Look at How Hackers Operate

We’ve all seen shows where a character like The Flash, for instance, needs eyes on a situation to fight the bad guy, and a computer nerd, like Felicity, breaks into Central City’s ...
Security Boulevard
The RastaLabs experience

The RastaLabs experience

IntroductionIt was 20 November, and I was just starting to wonder what I would do during the next month. I had already left my previous job, and the new one would only ...
Satan ransomware rebrands as 5ss5c ransomware

Satan ransomware rebrands as 5ss5c ransomware

The cybercrime group that brought us Satan, DBGer and Lucky ransomware and perhaps Iron ransomware, has now come up with a new version or rebranding named "5ss5c".In a previous blog post, Satan ...
Why Most Organizations Still Can’t Defend against DCShadow – Part 2

Why Most Organizations Still Can’t Defend against DCShadow – Part 2

In part 1 of this blog post, I talked about the threat that DCShadow poses to organizations that use Microsoft Active Directory (AD). Here in part 2, I’ll talk about steps you ...
Figure 1 – Monero’s value in USD from December 2018 to June 2019, source - CoinGecko.com

Cryptojacking: An Unwanted Guest

We analyse a cryptojacking attack that mines the Monero cryptocurrency. The value of Monero in US dollars has more than doubled over the first half of 2019, from $46 to $98. The ...
Emotet, Lokibot, TrickBot still impacting enterprise environments globally

Emotet, Lokibot, TrickBot still impacting enterprise environments globally

New research based on observed attack data over the second half of 2018 (2H 2018) reveals the command-and-control and lateral activities of three high-profile pieces of malware targeting large organizations in recent ...
Language Matters Data Breach

Five Eyes Cybersecurity Agencies Release Report on Hacking Tools

The national cybersecurity agencies of the United States, U.K., Canada, Australia and New Zealand, known in the intelligence world as the Five Eyes, have released a joint report on five publicly available ...
Security Boulevard
toolsmith #132 - The HELK vs APTSimulator - Part 2

toolsmith #132 – The HELK vs APTSimulator – Part 2

Continuing where we left off in The HELK vs APTSimulator - Part 1, I will focus our attention on additional, useful HELK features to aid you in your threat hunting practice. HELK ...
toolsmith #131 - The HELK vs APTSimulator - Part 1

toolsmith #131 – The HELK vs APTSimulator – Part 1

Ladies and gentlemen, for our main attraction, I give you...The HELK vs APTSimulator, in a Death Battle! The late, great Randy "Macho Man" Savage said many things in his day, in his ...