Author: Prevailion

What Wicked Webs We Un-weave

What Wicked Webs We Un-weave: Wizard Spider once again proving it isn’t you, it isn’t me; we search for things that you can’t see Authored by: Matt Stafford and Sherman Smith Executive summary: In late January 2022, Prevailion’s Adversarial Counterintelligence Team (PACT) identified extensive phishing activity designed to harvest credentials for Naver. Naver is a […]

Who are the latest targets of cyber group Lyceum?

By Accenture Cyber Threat Intelligence and Prevailion Adversarial Counterintelligence Team Prevailion’s Adversarial Counterintelligence Team and Accenture’s Cyber Defense group are teaming up to jointly utilize their respective proprietary data and expert analysis to deliver timely and in-depth security research. Our goal is to provide insights into threat actor tactics, targets, and campaigns to deliver actionable […]

Cert Safari: Leveraging TLS Certificates to Hunt Evil

  Proactively hunting for malicious infrastructure is a persistent puzzle for threat researchers to work and solve.  It is a complex and evolving problem, made more complex (though not unmanageable) by Domain Privacy and GDPR, which obscure WHOIS information that Analysts and Researchers would otherwise use to identify trends and corroborate other observations to increase confidence […]

TAG Cyber Research Article: Understanding Compromise Intelligence

by Ed Amoroso, CEO and Founder, TAG Cyber Compromise intelligence offers cyber defenders a means to utilize cyber threat information about malicious actor behavior to discover and contextualize compromises. Ed Amoroso describes what it is, how it works and to implement this compromise intelligence with Prevailion. Understanding Compromise Intelligence

Focusing on Compromise Intelligence vs. Vulnerability Intelligence

Prevailion Technical White Paper on preventing breaches by leveraging active compromises and associated 3rd party risk vs. solutions like Attack Surface Management that focus on Focusing on Compromise Intelligence vs Vulnerability Intelligence risk.

CTO Nate Warfield discusses Ransomware attacks

Prevailion CTO, Nate Warfield, discusses hacker sophistication increasing, exploitation of modern tech fatigue and the DOJ’s partial recovery of Colonial Pipeline ransomware payments.

Copyright 2022 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.