Category: Articles

Image of Prevailion Spartan

Compromise Intelligence: The Realization of a Decades-Old Promise

We can now move from the realm of the indicator of compromise or attack to Evidence of Compromise (EOC) resulting in real, actionable Compromise Intelligence.

Image of hospital map - April 2020

Cyber Risk Heightens for US and French Hospitals

A disturbing trend has emerged in the hospitals subsector of our global compromise intelligence visibility, showing hospitals in the US and France with compromises that are rapidly spreading.

Image of Marriot logo on building

Marriott Attacked via Third-Party Vector, Exposing Info on 5.2 Million Customers

Marriott International, Inc. is the latest victim in a string of cyber breaches targeting hotel chains, and Evidence of Compromise within Prevailion captured the key moments the organization veered off course and ultimately back on course. 

Healthcare Crosshair image

Prevailion CEO: Cyberattacks on Healthcare Won’t be Tolerated

As if the world needed another example, a ransomware group has proven there is no honor among thieves.  The cybercriminal group Maze attacked the network of Hammersmith Medicines Research, a London-based medical research company, on March 14. The group then leaked the personal data and medical details of thousands of former patients online, according to […]

Image of Prevailion TA505 activity map - March 2019

Map of TA505 Activity Shows Global Foothold After Necurs Botnet Goes Dark

Just shy of a week after Microsoft squeezed cyber criminals out of the prolific Necurs botnet infrastructure, threat actors like TA505 still maintain a foothold on networks throughout the world. Findings from Prevailion’s compromise intelligence platform on Wednesday showed the IP addresses TA505 have actively infected around the globe. Prevailion’s Chief Data Scientist Nate Winslow […]

Alert for Cyber Risk and COVID-19 - featured image

Alert for Cyber Risk and COVID-19

With COVID-19, there is a wave of new teleworkers hitting internet infrastructure. Cyber criminals will actively look for ways to take advantage of these teleworkers in order to gain access to otherwise secure company networks.

Copyright 2023 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.