SEON Ransomware ver 0.2 was found being distributed by the GreenFlash Sundown exploit kit via a drive-by-attack campaign. After performing the encryption, SEON will drop and display the following ransom note and append ‘.fixt’ as the extension
An early Carbon Black customer and Red Canary detection engineer provides perspective on Carbon Black’s technology evolutions.
This post was originally published by our partner Red Canary on May 30, 2019.
Back in 2013, I was one of the first
What are Living Off the Land (LoL) Attacks?
In recent years, Living off the Land Binaries and Scripts (LOLBas) have become increasingly popular tools for cybercriminals. These types of attacks leverage native, signed, and often pre-installed
Today we’re excited to announce Linux support for CB LiveOps, Carbon Black’s real-time endpoint query & remediation solution that helps security teams audit and change the state of their systems. This release expands the product’s footprint
Peter Silberman is the Director of Detection & Response, Innovation at Expel. Mary Singh is a Detection and Response Lead at Expel.
So, you want to build a threat hunting program…but where do you start?
There are lots of ways to build a
RISK 2019 Serbia took place on the 29th of May 2019 at the Radisson Collection Old Mill Belgrade hotel, where IT security specialists could meet, network, educate and of course, have fun. Watch the recap video below and all videos on demand from
Ryan Stolte is the co-founder and CTO for Bay Dynamics.
There are clearly many reasons why Endpoint Detection and Response (EDR) has materialized into such a hotbed of interest, investment and emerging best practices – endpoint security must
Danabot is a banking trojan written in the Delphi programming language. Delivery methods are typically via phishing emails that contain malicious attachments, which further call out to download the main payload using PowerShell or
Enterprises of all sizes face a massive challenge when it comes to IoT security.
With so many business operations reliant on technology, there can be vulnerabilities hiding in a multitude of places. Security teams, especially those who work in
We have just published the preliminary agenda for conference RISK 2019 Serbia, which will take place on May 29th 2019 at Radisson Collection Hotel, Old Mill Belgrade, Serbia. Attend presentations and technical demos from companies such as