Month: March 2020

White Paper - Third-Party Cyber Defense - featured image

Third-Party Cyber Defense: A New Level of Control & Visibility by Tracking the Adversary

Many of today’s businesses are beholden to a fundamental weakness—they are blind to the scope of their true perimeter. As businesses grow larger, their vast third-party vulnerabilities unfurl themselves, exposing the business to huge risks they aren’t even aware of.

Coronavirus criminals: Authorities wage war against virus scammers, thieves, impostors and idiots

From price-gouging, mask stealing and pharma-fraud to charity scams, app extortion, cyber-hacking and even “coughing” on people and produce for Instagram followers or as an act of hate, the new coronavirus-centered crime wave – like the spread of the novel virus – is gaining momentum by the minute.

Healthcare Crosshair image

Prevailion CEO: Cyberattacks on Healthcare Won’t be Tolerated

As if the world needed another example, a ransomware group has proven there is no honor among thieves.  The cybercriminal group Maze attacked the network of Hammersmith Medicines Research, a London-based medical research company, on March 14. The group then leaked the personal data and medical details of thousands of former patients online, according to […]

BEC Campaign Targets HR Departments: Report

TA505, a notorious cybercriminal group believed to be operating in Russia, is using business email compromise tactics to target a new group of victims – HR departments, according to researchers from Prevailion, a security monitoring firm.

TA505 Targets HR Departments with Poisoned CVs

Infamous cybercrime organization spotted in attacks that employ legitimate software — and Google Drive. A newly discovered attack campaign by the notoriously prolific TA505 cybercrime organization now is targeting businesses in Germany via their human resources executives.

How global tumult can impact early-stage startup investment

Fulton-based cyber startup foundry DataTribe released a new analysis showing that investment activity was trending down in uncertain times, even before COVID-19. Here’s a look at what that means for deals locally.

Copyright 2023 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.