Context

Prevailion CEO: Cyberattacks on Healthcare Won’t be Tolerated

As if the world needed another example, a ransomware group has proven there is no honor among thieves.  The cybercriminal group Maze attacked the network of Hammersmith Medicines Research, a London-based medical research company, on March 14. The group then leaked the personal data and medical details of thousands of former patients online, according to ComputerWeekly. HMR is one of several London firms situated to conduct medical trials for COVID-19 vaccines.  Beyond the despicable nature of the attack, of note is that Maze had made a public vow on March 18 not to...

Share Post

Map of TA505 Activity Shows Global Foothold After Necurs Botnet Goes Dark

Just shy of a week after Microsoft squeezed cyber criminals out of the prolific Necurs botnet infrastructure, threat actors like TA505 still maintain a foothold on networks throughout the world. Findings from Prevailion's compromise intelligence platform on Wednesday showed the IP addresses TA505 have actively infected around the globe. Prevailion's Chief Data Scientist Nate Winslow shared a map of this activity, along with his insight of the findings, on LinkedIn today. "Cyber crime is not slowing down because of COVID-19. The TA505 group is a prime example we see in our data. If...

Share Post

Alert for Cyber Risk and COVID-19

With COVID-19, there is a wave of new teleworkers hitting internet infrastructure. Cyber criminals will actively look for ways to take advantage of these teleworkers in order to gain access to otherwise secure company networks....

Share Post

How Working from Home During Coronavirus is Opening Fresh Vectors for Compromise

VPNs alone won’t protect workers from unsecured work environments. “Wash your hands. Don't scratch your nose. Try to avoid public spaces.” In the weeks leading up to COVID-19’s ascendance to a pandemic, we've all become more aware of our touch points as we go about our daily lives trying to avoid infection. If businesses practiced this level of vigilance for their network touch points, and their daily exposure to infected surfaces, threat actors would have a much smaller playground in which to operate. When businesses agree on connecting with each other, often it's...

Share Post

Indicators of Compromise are Dead — Introducing Evidence of Compromise

The mission of Evidence of Compromise is simple: empower companies to audit and continuously monitor the security of their supply chains to an unprecedented degree, with the possibility of even predicting future breaches based on this real-time intelligence. Current methods of cyber risk management, incident response and risk modeling have failed to keep up with the growing sophistication and speed of cyber adversaries, which range from organized criminal groups to state-sponsored hackers. As geopolitical tensions increase around the world, they are accelerating the overall risk for the financial sector, as this industry remains...

Share Post

What is Evidence of Compromise?

Evidence of Compromise (EoC) is a collection of forensic data that points to a confirmed malicious attack on a commercial, industrial or government network. ...

Share Post

What is Compromise Intelligence?

Compromise Intelligence is a new method of information gathering sourced from the activity surrounding networks with confirmed evidence of cyber compromise. ...

Share Post

Customer Success: Utility Cooperative – SEIEC

Matt Ohmes, IT Manager with SEIEC, said Prevailion gives his organization an extra tool to help verify whether a vendor is serious about security before it awards costly projects. If a vendor is found to be compromised, Ohmes can take that information to his CEO and the board to evaluate that relationship. Prevailion empowers Ohmes and his organization to: Verify if a vendor is serious about security before it awards a costly projectMonitor existing third-party vendors and identify Evidence of CompromiseAct on that evidence by limiting a vendor’s access to their networkShare...

Share Post