Lose the Audit-speak for Clearer Communications

Lose the Audit-speak for Clearer Communications

Every professional can easily fall into industry-speak. I even do this with my kids, who often find my words incomprehensible. My kids really pushed me to take a step back and re-assess how I communicate. In classes I teach, we frequently discuss the best level for auditors to write to—most say the junior high grades. [...]

Achieving Continuous Protection with Highly Available Next-Generation Firewall Deployments

Achieving Continuous Protection with Highly Available Next-Generation Firewall Deployments

Network outages and cyberattacks cause unplanned downtime. And most organizations are seeing dramatic growth both in data center traffic and the use of web-scale ready applications. These trends have resulted in an increased density of business-critical workloads driving requirements for high availability network designs that can handle workload mobility and business continuity. To ensure highly [...]

Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond

Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond

In 2015, Sucuri published two blog posts, one in March describing a pseudo-Darkleech campaign targeting WordPress sites, and another about its evolution the following December. Sites compromised by this campaign redirected unsuspecting users to an exploit kit (EK). The Sucuri posts describe patterns in the injected script related to this campaign. Since December 2015, patterns [...]

Locky Ransomware Installed Through Nuclear EK

Locky Ransomware Installed Through Nuclear EK

In February 2016, Unit 42 published detailed analysis of Locky ransomware. We certainly weren’t the only ones who saw this malware, and many others have also reported on it. Since that time, Locky has been frequently noted in various campaigns using malicious spam (malspam) to spread this relatively new strain of ransomware. When we initially [...]