Unit 42 has recently discovered a new variant of PowerWare, also known as PoshCoder, imitating the popular Locky ransomware family....
Month: July 2016
As mentioned in our previous blog, we observed the Sofacy group using a new persistence mechanism that we call “Office...
As cloud computing and unmanaged endpoints continue to gain traction, it is a foregone conclusion that information security technical controls...
Gartner’s June 2016 article, “Use These Five Backup and Recovery Best Practices to Protect Against Ransomware,” outlines five steps for mitigating the threat and/or...
COBIT 5’s Seven Phases of the Implementation Life Cycle have been “posterized” into a free download that illustrates the framework’s...