While threat actors like Cozy Bear and Fancy Bear get a lot of attention, there is another sophisticated crime actor that companies need to be watching out for. The group is called TA505 and it is believed to be a Russian criminal operation. However, there may be more to this group’s activities than purely financial […]
Since October 28th, Prevailion has been investigating current and potential future victims of the ransomware crime group known as UNC1878. While our investigation is still underway, we have so far identified hundreds of organizations worldwide that show compromise activity by this threat actor, and which may be in the early- to mid-stages of a Ryuk […]
We are pleased to announce that Prevailion has been named a Gartner Cool Vendor in the 2020 Cool Vendors in Security Operations and Threat Intelligence report. In the October 13th report, Gartner points out that “Organizations struggle to mitigate vulnerabilities because of the inability to prioritize them due to a lack of context about the […]
Prevailion’s threat intelligence team has substantially increased our monitoring of malicious cyber activity over the last month. The APEX™ Platform now tracks over 205 malware families, marking a 45% increase since the start of September. We have also increased our monitoring of malicious beacons by 20%, with more than 32 billion C2 communications collected. This […]
When considering global threat actors and the impact these groups can have on different geographical regions and industries, we’d be remiss to not spend some time talking about Goblin Panda, considered by Prevailion to be one of the most active Advanced Persistent Threat (APT) groups in the world today. According to the Council on Foreign […]
Gone are the days of small-time cybercriminals using ransomware to earn a quick buck. Ransomware–and the criminals who use it–have certainly evolved. Though it initially made a name for itself as a tactic of the lesser-skilled criminal, malicious actors are now exploiting the established expectations of its impact and limitations in order to hide inside […]