Ryuk ransomware attacks businesses over the holidays

Over the holiday, a little-known ransomware family called Ryuk caused serious damage to numerous organizations. The attacks leave a lot of questions unanswered. What do we know so far?

Read more

All this EternalPetya stuff makes me WannaCry

Get more background on the EternalPetya ransomware. Learn about its origin, attribution, decryption, and the methods of infection and propagation.

Read more

EternalPetya – yet another stolen piece in the package?

Since 27th June we’ve been investigating the outbreak of the new Petya-like malware armed with an infector similar to WannaCry. Since the day one, various contradicting theories started popping up. In this post, we will try to fill this gap, by making a step-by-step comparison of the current kernel and the one on which it is based (Goldeneye Petya).

Read more

A week in security (Nov 27 – Dec 03)

A compilation of notable security news and blog posts from the 27th of November to the 3rd of December. This week, we touched on Gooligan, attribution, a new WhatsApp phishing campaign, another ransomware, and a one-of-a-kind Apple spam.

Read more

Attribution Part II: Don’t overthink it

In Part II of this three-part series, we take a deeper look into the mistakes one easily makes in terms of cyber attack attribution.

Read more

A week in security (Oct 23 – Oct 29)

A compilation of notable security news and blog posts from the 23rd of October to the 29th. This week, we talked about Trick bot, attribution, a WhatsApp scam, and debunked certain hacker stereotypes.

Read more

Attribution, and when you should care: Part 1

Attribution is the practice of taking forensic artifacts of a cyber attack and matching them to known threats against targets with a profile matching your organization. If this seems overly complicated, that is intentional. There are degrees of attribution that map to very specific contexts and painting over that context with a simplistic reading accomplishes very little other than frightening decision makers into unnecessary expenditures.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language