Latest threat

EPISODE 4: When what’s ‘out there’ is already ‘in here’…And it’s demanding money with menaces.
SECURITY ANALYSTS STOP THE PANIC OF COMBINED RANSOMWARE AND DATA THEFT - AND FINGER THE PERPETRATORS Couldn’t we just have paid the ransom? The CEO’s story. CEO Doug was now in possession of all the facts relating to the attack that had simultaneously held his business’s data hostage and compromised his employees’ confidential login credentials. [...]
EPISODE 3: When what’s ‘out there’ is already ‘in here’…But your security software doesn’t know about either of them.
A TARGETED CAMPAIGN AGAINST CRITICAL ASSETS – WITH NOTHING TO STOP IT. DID A U.K. ENTERPRISE UNWITTINGLY HELP ITS HACKERS? Reactive, not predictive – an attacker’s paradise. The Head of IT’s story Head of IT, Tasneem, feels like she’s been caught in a multiple pincer movement. Ransomware came and ruined her week. Whilst she was [...]
EPISODE 2: When what’s ‘out there’ is already ‘in here’…But your security software doesn’t know about either of them.
REELING FROM INFECTION BY UNKNOWN THREAT VARIANTS, A MAJOR U.K. ENTERPRISE MISSES WHAT THE ATTACKERS WANT NEXT: CREDENTIALS Reactive, not predictive – an attacker’s paradise.The Head of IT’s story Head of IT, Tasneem, was battling a highly visible internal crisis: the appearance on employees’ screens of a ransom note holding the business’s data hostage, with [...]
EPISODE 1: When what’s ‘out there’ is already ‘in here’…But your security software doesn’t know about either of them.
A TRUE STORY OF UNDETECTED INITIAL INFECTION BY UNKNOWN THREAT VARIANTS – AND HOW IT HELD A MAJOR U.K. ENTERPRISE TO RANSOM He didn’t spot the threat and neither did the software. Chris’s story* “Funny, I don’t recognise that invoice. Still, I’d better get it out of the way – I’ve got loads to get [...]
Could a Ransomware attack close your operating theatres?

You graduated, travelled the world, got your first job, found the love of your life, had a wild 30th, bought a house, married the love of your life, had a baby, had another one, had a wild 40th, 50th… all the best moments captured beautifully through photos and shared with friends and family via the […]

Rowhammer: another case study in why you shouldn’t panic

‘Rowhammer’ hit the press recently. And, as you will know, it’s not a reference to a character in a computer game (although it sounds like quite a good name to me). Instead, it’s a recently discovered IT security vulnerability. Normally that’s nothing new, but this time it’s one with a difference. Predictably, the media has […]

The real lessons from Shellshock and Heartbleed

The real lessons from Shellshock and Heartbleed.  Patches continue to arrive in businesses’ update packages, but it looks as though the worst of the Shellshock security issue is behind us. Likewise the Heartbleed flaw identified in the ubiquitous OpenSSL cryptographic software library. As every IT professional knows all too well, these were simply two more […]

Shellshock – Recent urgent vulnerability

Urgent Vulnerability – Shellshock. From time to time there is an urgent vulnerability identified that may impact our clients and is widely reported in the press. Some of this reporting can be fairly enthusiastic, and some customers have commented that they would appreciate a more professional view. So we have prepared the following positioning statement and […]

Has cyber threat CryptoLocker held you to ransom yet?

Trojan horse malware targets any computer running on Microsoft Windows in a ‘cryptography blackmail’ attack. Reading the Saturday supplements at the weekend, it doesn’t take much to distract a techie from the homes & gardens section. When we see words like ‘blackmail’ and ‘cryptography’ in the same paragraph it immediately set our pulses racing. We […]

Critical Security Controls Survey: Moving From Awareness to Action

New and more robust security standards and frameworks developed to address risks to enterprise IT systems and the critical data. Whilst security controls are not very exciting, they do help to keep organisations safe. Many security standards and frameworks have been developed in recent years to address risks to enterprise systems and the critical data […]

5 signs you’ve been hit with an advanced persistant threat

Advanced persistent threats can steal valuable intellectual property, confidential project descriptions, contracts and patent information. A real and constant threat to the world’s companies and networks is APT (advanced professional team). Their goal typically, is to steal valuable intellectual property, such as confidential project descriptions, contracts and patent information. They are difficult to spot because […]

Zombie-animating malnets increase 200% in just 6 months

Increase in delivery of botnets poses a more potent and numerous threat to business IT networks. Cybercrooks are beefing up the infrastructure behind the delivery of botnets, a move that is leading towards more potent and numerous threats, say researchers. Computers can be co-opted into a botnet infection that spreads through compromised networks to execute […]