fbpx

Petya / Nyetya Ransomware Attack, a brief overview

update 29/6/2017: Wiper instead of ransomware? What is it? A new variant of the Petya ransomware (Also named NotPeyta or Nyetya by other companies) is on the loose. It uses a known and legitimate method of spreading on top of exploitation of the EternalBlue exploit. This makes it different and more dangerous than other malware […]

Fighting QakBot.T – A Wormable Banking Trojan

Introduction to the Incident Recently we where notified by a large international company of an incident in one of its sites in the US. The incident resulted in the spread of the computer worm QakBot.T onto an estimate of 160 workstations and laptops inside one of the network sites of the client. The computer-worm created […]

Social Engineering; Why I think your business should care

I’m amazed every single day about the way people think about normal-life security inside companies. Big or small; everybody has weaknesses that go unnoticed until disaster strikes. Whether it’s an employee, a disgruntled employee or an external entity who gained access to your company; it doesn’t matter much. Any of them can cause your company to […]

Plan your Hacking Strategy

Incident response is the art (and science) of responding to computer security-related breaches. Interestingly, most organizations I deal with don’t have a documented incident response plan. The last thing you want to do during and after a security breach is figure out the best approach for handling the situation.  It is an often overlooked component […]