Dridex (Bugat v5) Botnet Takeover Operation

click photo for more information
Dridex (Bugat v5) Botnet Takeover Operation
Type: Threat Analysis Category: CTU Research The CTU research team collaborated with the UK NCA, the U.S. FBI, and the Shadowserver Foundation to take over the Dridex Bugat v5 banking trojan.
0
159

Favorite! Would you like to add notes/tags?

Hacker Group Creates Network of Fake LinkedIn Profiles

click photo for more information
Hacker Group Creates Network of Fake LinkedIn Profiles
Type: Threat Analysis Category: CTU Research While tracking a suspected Iran-based Threat Group-2889, SecureWorks CTU researchers uncovered a network of fake LinkedIn profiles.
0
146

Favorite! Would you like to add notes/tags?

Threat Group 3390 Cyberespionage

click photo for more information
Threat Group 3390 Cyberespionage
Type: Threat Analysis Dell SecureWorks Counter Threat UnitTM (CTU) Investigated Activities Associated with Threat Group-3390 Category: CTU Research Analysis of TG-3390’s operations, targeting, and tools led CTU researchers to assess with moderate confidence the group is located in China.
0
149

Favorite! Would you like to add notes/tags?

Sakula Malware Family

click photo for more information
Sakula Malware Family
Type: Threat Analysis Category: CTU Research CTU researchers analyzed the Sakula Malware Family which enables an adversary to run interactive commands to download and execute additional components.
0
122

Favorite! Would you like to add notes/tags?

TeslaCrypt Ransomware

click photo for more information
TeslaCrypt Ransomware
Type: Threat Analysis Category: CTU Research CTU researchers investigated a new file-encrypting ransomware family named TeslaCrypt, which was distributed by the popular Angler browser exploit kit.
0
140

Favorite! Would you like to add notes/tags?

Banking Botnets Persist Despite Takedowns

click photo for more information
Banking Botnets Persist Despite Takedowns
Type: Threat Analysis Category: CTU Research Threats to banks and financial institutions continue to grow and mature as cybercriminals become far more creative and increasingly organized.
0
140

Favorite! Would you like to add notes/tags?

Skeleton Key Malware Analysis

click photo for more information
Skeleton Key Malware Analysis
Type: Threat Analysis Category: CTU Research SecureWorks Counter Threat Unit™ researchers discovered malware that bypasses authentication on Active Directory systems.
0
146

Favorite! Would you like to add notes/tags?

CryptoWall Ransomware Threat Analysis

click photo for more information
CryptoWall Ransomware Threat Analysis
Type: Threat Analysis Category: CTU Research Read why CTU researchers consider CryptoWall to be the largest and most destructive ransomware threat on the Internet as of this publication.
0
148

Favorite! Would you like to add notes/tags?

Malware Analysis of the Lurk Downloader

click photo for more information
Malware Analysis of the Lurk Downloader
Type: Threat Analysis Category: CTU Research Take a deeper look at Lurk, a malware downloader that uses digital steganography: the art of hiding secret information within a digital format.
0
129

Favorite! Would you like to add notes/tags?

Your Cybersecurity IQ

click photo for more information
Your Cybersecurity IQ
Know the Threat Category: IntelligenceLeadership Insights Stay one step ahead of threats by knowing the security landscape, who the threat actors are, and how they operate.
0
154

Favorite! Would you like to add notes/tags?

Cyber Security IQ

click photo for more information
Cyber Security IQ
Know the Threat Category: Intelligence This white paper will help you learn what motivates cyber criminals, what they want from your business and some practices for resilience against them.
0
135

Favorite! Would you like to add notes/tags?

5 Valuable Contextual Data Sources for Small Businesses

click photo for more information
5 Valuable Contextual Data Sources for Small Businesses
Data is critical for proper information security monitoring, and understanding the context helps differentiate between real threats and false positives.
0
161

Favorite! Would you like to add notes/tags?

Is Your Incident Response Plan Ready for a Cyber Security Breach?

click photo for more information
Is Your Incident Response Plan Ready for a Cyber Security Breach?
Category: Incident Response and Management An Incident Response Plan is critical to any organization to contain and stop a potential information security breach from cyber-attacks. Are you prepared?
0
135

Favorite! Would you like to add notes/tags?

Breach Disclosure: The Greater Good; or Enemy of the Enterprise?

click photo for more information
Breach Disclosure: The Greater Good; or Enemy of the Enterprise?
The stats on security breaches within companies make for bleak reading, 93% of large organisations and 76% of small businesses reported breaches last year.
0
127

Favorite! Would you like to add notes/tags?