Social Engineering: Placing Obstacles in the Path of Least Resistance

Social Engineering: Placing Obstacles in the Path of Least Resistance

Organizations battle daily with social engineering-based cyberattacks and unfortunately often find themselves on the losing side. What can be done? To determine this, we need to step back from our technological tools and start with the psychological basis of why social engineering works and why it is a tactic of choice for cyber attackers. Armed [...]

Locky: New Ransomware Mimics Dridex-Style Distribution

Locky: New Ransomware Mimics Dridex-Style Distribution

Ransomware persists as one of the top crimeware threats thus far into 2016. While the use of document-based macros for ransomware distribution remains relatively uncommon, a new family calling itself “Locky” has borrowed the technique from the eminently successful Dridex to maximize its target base. We first learned of Locky through Invincea and expanded on [...]

Traps: Preventing Successful Attacks on Legacy ATM Endpoints

Traps: Preventing Successful Attacks on Legacy ATM Endpoints

Microsoft discontinued support of the venerable Windows XP operating system (OS) in April 2014. This OS had been a workhorse for over 12 years with a foothold on consumers, enterprises, and embedded systems such as automated teller machines (ATMs). A year later, it was estimated that 75 percent of the world’s ATMs (2.2 million) were [...]

Four Imperatives for Cybersecurity Success in the Digital Age: Part 1

Four Imperatives for Cybersecurity Success in the Digital Age: Part 1

Having joined Palo Alto Networks following a 35-year career in the U.S. military, the past decade of which I served in a variety of leadership positions in cyber operations, strategy and policy, I have found that many of the cybersecurity challenges we face from a national security perspective are the same in the broader international [...]

Actionable Threat Intelligence: The Key to Efficient and Comprehensive Security

Actionable Threat Intelligence: The Key to Efficient and Comprehensive Security

“Action is the true measure of intelligence.” There is much truth in these words by Napoleon Hill; and, even though they are aimed at personal improvement, they also apply to cybersecurity. Intelligence allows for better organization, prioritization, and display of network and threat data. Intelligence, applied in the right way to network security, leads to [...]