Keep Employees Secure, Wherever They Are

As workers grow more dispersed, organizations need to focus on three areas to maintain security. Nearly 80% of professionals work remotely at least one day a week, and 1.55 billion others are expected to work outside the boundaries of the corporate office by 2020, according to Frost & Sullivan research. This shift to a mobile…

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak — a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle. Yet, there is one ally that has emerged in recent years. Artificial…

The Role of the Network in Preventing Dyn 2.0

Much has been said about the DDoS attacks on Dyn and the subsequent security issues surrounding IoT devices.  In late 2016, hackers exploited hundreds of thousands of IoT devices, such as security cameras and DVRs, to cause massive internet outages over a prolonged period of time. While this attack has resulted in an uproar of…

Why do I care about someone else’s data breach?

Because as the size of your organization increases, the probability that an individual employee’s company email is in that breach rises to 1. That lone employee is going to be suffering some unfortunate impacts, from identity theft, financial scams, blackmail, and even death threats (as seen in the Ashley Madison breach). There’s an organizational impact…

The Interconnected Nature Of International Cybercrime

Flashpoint analysts monitoring a top-tier Russian hacking forum recently observed an actor who goes by the pseudonym “flokibot,” developing a Trojan known as “Floki Bot.” While the malware uses source code from the ZeuS Trojan, the actor reinvented the initial dropper process injection to instead target point-of-sale (PoS) terminals. The Floki Bot Trojan is not…

A look back at the Zyns iframer campaign

We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to getting infected. This is an interesting aspect when tracking campaigns and what they lead to. Typically, one can divide the drive-by landscape into two categories: malvertising and compromised websites. The former involves legitimate websites…