Ransomware: What Monetary Value Would You Assign to Your Data?

Ransomware: What Monetary Value Would You Assign to Your Data?

Incidents involving ransomware are becoming more prevalent and can devastate an underprepared organization. What is most alarming is that ransomware variants are increasingly easier to obtain and deploy by not only criminal syndicates, but anyone with the means and desire to purchase. In the community we have seen rapid development of ransomware with many of [...]

Tech Docs: How Secure is Your Internet Gateway?

Tech Docs: How Secure is Your Internet Gateway?

One of the cheapest and easiest ways for an attacker to get into to your network is through users accessing the Internet. By successfully exploiting an endpoint, an attacker can take hold in your network and begin to move laterally toward an end goal, whether that is to steal your source code, exfiltrate your customer [...]

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

We have observed an attack led by the APT group Wekby targeting a US-based organization in recent weeks. Wekby is a group that has been active for a number of years, targeting various industries such as healthcare, telecommunications, aerospace, defense, and high tech. The group is known to leverage recently released exploits very shortly after [...]