Cyphort Inc
Cyphort Inc
Blog Post
  •   Today, Equifax, which is in the business of supplying credit information on consumers from many countries, disclosed a cyber breach that took place from mid May through July 2017. […] The post Equifax Breach: The News We All Dreaded to Hear. appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • Dark Reading published an interesting article recently, highlighting a growing conundrum facing many large organizations today.  That is, the pace of investments in cybersecurity solutions is being constrained by the […] The post How to Achieve Faster Incident Response at a Lower Cost appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • Cyber threat actors are constantly developing new Tools, Techniques and Procedure (TTP) to break your first line of defense offered by firewalls, intrusion prevention system, email and web security gateways […] The post Stop Ignoring Dwell Time – It Will Cost You Big Time appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • As early as May 2017, we’ve seen spear phishing campaigns that use ISO file type as an attachment to emails. That is a good alternative for zip in delivering malware […] The post Spear Phishing: from ZIP to ISO Attachments appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
Cyphort Inc
Cyphort Inc
Blog Post
  • On June 27, we have seen yet another wave of ransomware with worm spreading capability hit various countries around the world. This one, dubbed PetrWrap, seem to be similar to Petya […] The post NotPetya: A Ransomware Wave on the Wake of WannaCry appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • On June 27, we have seen yet another wave of ransomware with worm spreading capability hit various countries around the world. This one, dubbed PetrWrap, seem to be similar to Petya […] The post PetrWrap: A Ransomware Wave on the Wake of WannaCry appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • Cyphort has been monitoring how threat actors are exploiting computing resources from compromised victims to  mine various crypto currencies. In our latest discovery, it seems these threat actors are aware […] The post Turf War Erupts Between Crypto Currency Miners appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • An FBI report released last year estimated 327,374 robberies nationwide, which accounted for an estimated loss of $390 million. Cyber theft is not far different from the physical theft but […] The post Avoid Alert Fatigue: Simplify and Accelerate Your Incident Response appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • In our continuous monitoring of threats in the wild, Cyphort Labs has detected multiple exploitation attempts using the recently disclosed Samba vulnerability CVE-2017-7494. The threat actors probably belong to same cyber […] The post Samba CVE-2017-7494 Getting Exploited in the Wild, Distributing Bitcoin Miners appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • Strange title, I know. But hang with me. In my previous blog, I mentioned three research projects that Cyphort recently completed, which revealed growing dissatisfaction among SIEM users. Their two […] The post Why UEBA Might Have Sent Johnny to Jail appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • During the WannaCry pandemic attack, CyphortLabs discovered that other threat actors have been using the same EternalBlue exploit to deliver other malware. This malware is not a ransomware and is not a […] The post EternalBlue Exploit Actively Used to Deliver Remote Access Trojans appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • In the course of our research on the massive WannaCry ransomware campaign that affected more than a hundred countries since Friday May 12, Cyphort researchers have come across a sample […] The post Cyphort identifies harder to kill WannaCry Ransomware appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • Cyphort has been seeing an ongoing spam campaign distributing the Hancitor trojan. Hancitor is a malicious document that contains a macro which will trigger the download of a secondary payload. The […] The post Hancitor’s Exploitation of Win32 APIs to do its Malicious Bidding appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • At Cyphort Labs, we discovered a new wave of Emotet making rounds as early as March 29, 2017. Emotet is known to be a notorious banking Trojan that performs information […] The post New Emotet likes Cookies, C2 Server Responds with Fake 404 appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • Over the past several months, Cyphort has been working with the Ponemon Institute, Osterman Research, and InterQ research on three separate research projects, all aimed at getting a better understanding […] The post Putting the “S” Back into SIEM appeared first on Cyphort.

Cyphort Inc
Cyphort Inc
Blog Post
  • Karmen is a new RaaS (Ransomware as a Service) being offered in the underground forum. According to a recent research from Recorded Future, this ransomware is being advertised and sold in a […]

Cyphort Inc
Cyphort Inc
Blog Post
  • I recently participated in a panel hosted by ITSP Magazine about #Vault7. For background, on March 7, WikiLeaks posted the “largest ever publication of confidential documents” from the CIA, that […]

Cyphort Inc
Cyphort Inc
Blog Post
  • In this article, we will lay out arguments with real-life examples in support of behavioral detection of malware as opposed to more traditional static methods of detection. For the sake […]

Cyphort Inc
Cyphort Inc
Blog Post

New blog articles detected.

  • Buhtrap Malware: What Every Bank’s Security Team Needs To Know

    In our recent blog, we talked about the delivery of Buhtrap by using compromised website and a recent web exploit. On this blog, we will focus on the second stage […]

  • A Contrarian Approach to Cybersecurity – Less is More

    In a recent print edition of The Economist, there is a very relevant article – “Modeling Brains: Does not compute.” It provides a cautionary tale about promises of modern brain […]

  • DDoS and The Internet of Things

    In the last few days, we heard a lot about the Mirai Internet-of-Things botnet, which caused a DDoS attack against Dyn. But Mirai is a relatively small botnet because the majority […]

  • RIG Exploit Kit says “I Do”

    Cyphort Labs discovered a new attack campaign that links to malicious exploits from hijacked DNS servers of personal wedding websites. Personal wedding websites are used to aid in planning and communicating important details for a […]

Cyphort Inc
Cyphort Inc
Blog Post
  • What is Buhtrap? Buhtrap is a criminal cyber hacking group that targets financial institutions. As reported by Group-IB, Buhtrap has been active since 2014. From August 2015 to February 2016, it managed to conduct 13 successful attacks against Russian banks and defrauded them of a total of 1.8 billion rubles (US$25.7M)! Buhtrap is usually dropped onto a victim’s system via a malicious RTF document...

Cyphort Inc
Cyphort Inc
Blog Post

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.