Second Wave of Shamoon 2 Attacks Identified

Second Wave of Shamoon 2 Attacks Identified

In November 2016, we observed the reemergence of destructive attacks associated with the 2012 Shamoon attack campaign. We covered this attack in detail in our blog titled Shamoon 2: Return of the Disttrack Wiper, which targeted a single organization in Saudi Arabia and was set to wipe systems on November 17, 2016. Since our previous [...]

Tech Docs: Collect and Refine Threat Intelligence with MineMeld

Tech Docs: Collect and Refine Threat Intelligence with MineMeld

The use of threat intelligence to defend networks against attacks is on the rise. Threat intelligence consists of evidence-based and actionable knowledge about attacks. As members of the security arena chip in to share threat intelligence, this poses a new challenge: wrangling threat intelligence from multiple sources into a single format that a security platform [...]

Ransomware: A top security threat for 2017

Ransomware: A top security threat for 2017

With the dawn of 2017, ransomware continues to emerge as a top security threat. This form of attack that encrypts and locks computer files and devices until a ransom is paid looms ominously over large companies, SMEs and even individuals. Ransomware is part of the top 10 security threat predictions by various analysts and security [...]