We’re seeing a rash of ransomware sweeping across IT systems, ranging from large enterprises to microbusinesses with only a few PCs. As I am writing this, we are in the middle of responding to an incident where a business has been entirely shut down due to being infected with the Locky ransomware. The entire business has […]
With all of the scams running around the Internet today, it’s easy to ask “what can we do?” Just last week I met with an employee of a company that had been completely shut down for a week due to ransomware (probably Locky, probably delivered by an email to an HR executive who had too […]
I recently finished reading Mandiant‘s fantastic APT1 Report. One of the gems is on page 29, which details some of the tactics used by phishing attacks carried out by APT1, (speculated to be the elite cyber-attack wing of the Chinese military).
We recently handled an incident response case where our client was infected by malware which was delivered by email. The client plead ignorance, and asked “how can we tell what is real and what is a virus?” Here’s a quick tip to do just that!
Every now and then we get a call from a client, telling us that they are receiving messages stating that their emails are being rejected, or “bouncing.” The catch? They never sent the email in the first place. So what’s going on?
Today I found this little gem in my inbox. The hardest thing to believe is that people are still actually falling for these things.