Cyber- Photokeratitis Some Thoughts On The Events Associated with UNC2452 Like many who have worked in the threat research & intelligence, forensics, and incident response space some time, when I became aware of Fire...
Insights
Insights & Analysis from the Prevailion Tailored Intelligence TeamSince October 28th, Prevailion has been investigating current and potential future victims of the ransomware crime group known as UNC1878. While our investigation is still underway, we have so far identified hundreds of ...
We are pleased to announce that Prevailion has been named a Gartner Cool Vendor in the 2020 Cool Vendors in Security Operations and Threat Intelligence report. In the October 13th report, Gartner points out that “Organ...
When considering global threat actors and the impact these groups can have on different geographical regions and industries, we’d be remiss to not spend some time talking about Goblin Panda, considered by Prevailion to...
Gone are the days of small-time cybercriminals using ransomware to earn a quick buck. Ransomware–and the criminals who use it–have certainly evolved. Though it initially made a name for itself as a tactic of ...
Prevailion is excited to launch six new features in its latest release of the APEX Platform, version 4.6. The features, outlined below, give organizations higher fidelity on real-time compromise activity empowering you...
Prevailion recently disclosed an active trojan compromise in the network of NCR Corporation. We at Prevailion are extremely pleased that NCR has taken this matter seriously, including the engagement of an elite IR team, ...
While Magecart is well known as a malware hacking groups use to inject card-skimming scripts into e-commerce platforms, Prevailion researchers have detected many compromises with Magecart that suggest the malicious actor...
Carnival Corporation is back in the news again with another data breach. This time, the company disclosed in a recent 8-K filing that its network was compromised by an unnamed ransomware on August 15th which “encrypted...
Detecting and containing a data breach takes the better part of a year, approximately 280 days, for the average organization, according to IBM’s 15th annual Cost of a Data Breach Report, Unfortunately, the longer it ta...
When conducting an audit of your cybersecurity plans, it’s important to reassess risk and evaluate whether established policies and procedures are both effective and actionable. To aid in cyber compliance, CSO Online s...
Introduction For quite some time we at Prevailion have been speaking publicly to the nature of the differences between Prevailion and other vendors in the threat intelligence market, and for good reason. There are two ke...
When two companies are directly connected to each other, they need to believe that the other is doing all it can to shore up its defenses. What happens, though, when the relationship between two companies is distinctivel...
Earlier this year Dark Reading published a six part series, “Cybersecurity and the Human Element: We’re All Fallible,” in which the authors examined common mistakes of end users as well as the potential repercussio...
Assessments are important. You’d be hard pressed to find any cybersecurity professional who would argue they aren’t needed, but the problem with third-party risk assessments is that they are far from comprehensive. U...
Everyone has something to hide. The beauty of that truth for hackers is that even if they don’t know their target’s dirty little secrets, they know that no one wants their secrets exposed. The mere threat of being pu...
When researchers at Independent Security Evaluators published its 2016 report, Hacking Hospitals, the idea that vulnerabilities in medical devices could result in patient harm seemed like a serving of FUD (fear, uncertai...
According to the annual ESG survey, 60% of companies said they were targeted with a ransomware attack in 2019. Not surprisingly, those organizations are looking to augment their cybersecurity tools and processes. Defense...