Month: May 2020

Image of Cybersecurity, Information privacy, data protection, virus and spyware defense

How Effective Are Your Security Investments?

According to the annual ESG survey, 60% of companies said they were targeted with a ransomware attack in 2019. Not surprisingly, those organizations are looking to augment their cybersecurity tools and processes. Defense in depth has long been touted as a reliable approach to securing the enterprise, and the strategy of adding layers has led […]

Microsoft Warns of COVID-19 Phishing Emails Spreading RAT

An ongoing “massive” COVID-19-themed phishing campaign is attempting to install the NetSupport Manager remote access tool on Windows devices, according to a series of alerts from the Microsoft Security Intelligence team.

Fake resumes, job and mortgage offers take advantage of coronavirus chaos

The coronavirus crisis has provided fresh opportunity for online scammers to target newly unemployed and financially vulnerable workers, and now employers as well.

Image of Prevailion map

Visibility is Key to Securing Election Infrastructure

While many feel that they are living in Groundhog Day, the days and weeks do continue to pass us by, bringing the 2020 Presidential election closer with still no clear path for securing the election process. Recognizing the risks, the National Institute of Standards and Technology (NIST) published a document of risk management for election […]

Apex Report Header image Q1 2020

The Q1 2020 APEX™ Report

How did a group of criminals come to be responsible for such a costly enterprise? Threat actors are distributed, and they don’t form one cohesive group,  but the holes they’ve punched in organizations and governments through infiltration, compromises, and breaches have collectively amounted to this staggering estimate.

Phantom in the Command Shell

Prevailion’s Tailored Intelligence Team has detected two new criminal campaigns targeting the global financial industry with the EVILNUM malware, one of which became active on May 3rd 2020. We have dubbed these new operations “Phantom in the [Command] Shell”.

Copyright 2023 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.