Category: Articles

Image of word writing text Advanced Persistent Threat. Business concept for unauthorized user gains access to a system Keyboard key Intention to create computer message pressing keypad idea

Goblin Panda – One of the World’s Most Active APTs

When considering global threat actors and the impact these groups can have on different geographical regions and industries, we’d be remiss to not spend some time talking about Goblin Panda, considered by Prevailion to be one of the most active Advanced Persistent Threat (APT) groups in the world today. According to the Council on Foreign […]

Ransomware thumbnail image

Ransomware as a Data Breach Decoy

Gone are the days of small-time cybercriminals using ransomware to earn a quick buck. Ransomware–and the criminals who use it–have certainly evolved. Though it initially made a name for itself as a tactic of the lesser-skilled criminal, malicious actors are now exploiting the established expectations of its impact and limitations in order to hide inside […]

APEX Platform 4.6

NEW Release – APEX™ Platform 4.6 Delivers Greater Fidelity on Confirmed Cyber Attacks and Threats

Prevailion is excited to launch six new features in its latest release of the APEX™ Platform, version 4.6.  The features, outlined below, give organizations higher fidelity on real-time compromise activity empowering your security and cyber risk teams to be more effective, work faster, and immediately prioritize confirmed threats. Over the past four months, APEX™ Platform […]

Wells Fargo image

A Note on the Trojan Compromise of NCR Corporation

Prevailion recently disclosed an active trojan compromise in the network of NCR Corporation. We at Prevailion are extremely pleased that NCR has taken this matter seriously, including the engagement of an elite IR team, and we applaud them for their quick and diligent response to the compromise we detected inside their network. As with all […]

E-commerce, Shopping online.

Masquerading as Card-Skimmers: Are Attackers Doing More with Magecart?

While Magecart is well known as a malware hacking groups use to inject card-skimming scripts into e-commerce platforms, Prevailion researchers have detected many compromises with Magecart that suggest the malicious actors are not actually going after credit card data.  According to public data breach records, the credit card information of organizations from British Airways to […]

Prevailion - Carnival Cruise Lines - dashboard screenshot

Carnival Cruise Lines’ Long-Running Breach Problem

Carnival Corporation is back in the news again with another data breach. This time, the company disclosed in a recent 8-K filing that its network was compromised by an unnamed ransomware on August 15th which “encrypted a portion of one brand’s information technology systems” and “the download of certain of our data files.” This is […]

Copyright 2023 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.