ransomware

November 17, 2020

THREAT RESEARCH

Nibiru ransomware variant decryptor

Nikhil Hegde developed this tool. Weak encryption The Nibiru ransomware is a .NET-based malware family. It traverses directories in the local disks, encrypts files with Rijndael-256 and gives them a .Nibiru extension. Rijndael-256 is a secure encryption algorithm. However, Nibiru uses a hard-coded string “Nibiru” to compute the 32-byte key and 16-byte IV values. The […]

August 5, 2020

PARTNER

Cisco and IBM Security Simplified: Mapping the Story

Cisco and IBM have jointly developed a comprehensive security story, greatly simplifying your vendor and tools landscape.

May 26, 2020

SECURITY

Why Endpoint Security Matters in Protecting Remote Workers – Part 1

Enabling your workforce to work securely on any endpoint, anywhere, is now more important than ever. See our customer’s thoughts on the value that AMP for Endpoints brings to their business.

May 18, 2020

SECURITY

Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test

Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV Comparatives Business Main Test Series for 2020.

March 3, 2020

SECURITY

Security Reimagined

We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.

December 17, 2019

SECURITY

Incident Response Lessons From Recent Maze Ransomware Attacks

This post authored by JJ Cummings and Dave Liebenberg This year, we have been flooded with reports of targeted ransomware attacks. Whether it’s a city, hospital, large- or medium-sized enterprise — they are all being targeted. These attacks can result in significant damage, cost, and have many different initial infection vectors. Recently, Talos Incident Response has been engaged […]

November 13, 2019

THREAT RESEARCH

Hunting For LolBins

Attackers’ trends tend to come and go. But one popular technique we’re seeing at this time is the use of living-off-the-land binaries — or “LoLBins”. LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases. Living-off-the-land tactics […]

August 21, 2019

THREAT RESEARCH

What you — and your company — should know about cyber insurance

It’s no longer a question of “if” any given company or organization is going to be hit with a cyber attack — it’s when. And when that attack comes, who...