Secure Works

Phases of a Post-Intrusion Ransomware Attack

After establishing a foothold in a network, threat actors attempt to discover additional info by harvesting credentials, escalating privileges, scanning and enumerating the network and gathering data.

Ongoing Campaign Leveraging Exchange Vulnerability Potentially Linked to Iran

Analysis by Secureworks CTU researchers suggests that an Iranian threat group, possibly Oilrig, was responsible for the activity that started with the compromise of the Exchange Servers.

COVID-19 stimulus fraud targets U.S. citizens

Secureworks Counter Threat Unit researchers have observed an increase in tax identity theft aimed at fraudulently obtaining stimulus checks.

How Cyber Adversaries are Adapting to Exploit the Global Pandemic

It's very likely that threat groups will explore their targets’ increased attack surface as employees transition to working from home and uptake in remote access and conferencing solutions continues.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags