Type: Threat Analysis Category: CTU Research The CTU research team collaborated with the UK NCA, the U.S. FBI, and the Shadowserver Foundation to take over the Dridex Bugat v5 banking trojan.
Type: Threat Analysis Category: CTU Research While tracking a suspected Iran-based Threat Group-2889, SecureWorks CTU researchers uncovered a network of fake LinkedIn profiles.
Type: Threat Analysis Dell SecureWorks Counter Threat UnitTM (CTU) Investigated Activities Associated with Threat Group-3390 Category: CTU Research Analysis of TG-3390’s operations, targeting, and tools led CTU researchers to assess with moderate confidence the group is located in China.
Type: Threat Analysis Category: CTU Research CTU researchers analyzed the Sakula Malware Family which enables an adversary to run interactive commands to download and execute additional components.
Type: Threat Analysis Category: CTU Research CTU researchers investigated a new file-encrypting ransomware family named TeslaCrypt, which was distributed by the popular Angler browser exploit kit.
Type: Threat Analysis Category: CTU Research Threats to banks and financial institutions continue to grow and mature as cybercriminals become far more creative and increasingly organized.
Type: Threat Analysis Category: CTU Research SecureWorks Counter Threat Unit™ researchers discovered malware that bypasses authentication on Active Directory systems.
Type: Threat Analysis Category: CTU Research Read why CTU researchers consider CryptoWall to be the largest and most destructive ransomware threat on the Internet as of this publication.
Type: Threat Analysis Category: CTU Research Take a deeper look at Lurk, a malware downloader that uses digital steganography: the art of hiding secret information within a digital format.
Know the Threat Category: IntelligenceLeadership Insights Stay one step ahead of threats by knowing the security landscape, who the threat actors are, and how they operate.
Know the Threat Category: Intelligence This white paper will help you learn what motivates cyber criminals, what they want from your business and some practices for resilience against them.
Data is critical for proper information security monitoring, and understanding the context helps differentiate between real threats and false positives.
Category: Incident Response and Management An Incident Response Plan is critical to any organization to contain and stop a potential information security breach from cyber-attacks. Are you prepared?
The stats on security breaches within companies make for bleak reading, 93% of large organisations and 76% of small businesses reported breaches last year.