TECHNOLOGY > Forensics

TECHNOLOGY > Forensics Category Archive

« Back to News

Microsoft, Kaspersky & Symnantec Weigh In On WannaCry Ransomware

by Tim Heath on 2017-05-16 09:53AM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean Cybergang known as Lazarus Group.

Read Full Story

Cybersecurity Has A Metrics Problem

by Tim Heath on 2017-05-12 03:57PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW

Building security metrics, measuring risk and improving cyber incident communications in your organisation aren’t “one and done” processes.

Read Full Story

Ransomware 'customer support' Chat Reveals Criminals' Ruthlessness

by Tim Heath on 2017-04-12 12:48PM in TECHNOLOGY-Forensics, NEWS-Newsletter Archive, GOVERNMENT-Police, FREE TO VIEW

Held to ransom by cyber extortionists? You might get easy payment terms, but absolutely no discount.

Read Full Story

New Malware Hides In Memory

by Tim Heath on 2017-03-21 05:55PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

Read Full Story

A Common Language For Sharing Intelligence On Cybersecurity Threats

by Tim Heath on 2017-03-21 11:26AM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn

Read Full Story

Stealthy Malware Is Going Mainstream

by Neil Telford on 2017-02-21 06:59PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

Read Full Story

Malware Traders Switch To Less Suspicious File Types

by Neil Telford on 2017-02-15 02:22PM in TECHNOLOGY-Forensics, NEWS-News Analysis, GOVERNMENT-Police, FREE TO VIEW

After aggressively using JavaScript email attachments to distribute malware, attackers are now switching to less suspicious file types.

Read Full Story

Ransomware- Practical Advice To Protect & Recover Using Free Tools

by Tim Heath on 2017-01-31 03:58PM in TECHNOLOGY-Forensics, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal

Read Full Story

Iranian Malware Delivered Via Fake Oxford University Sites

by Neil Telford on 2017-01-24 09:26PM in FREE TO VIEW, NEWS-News Analysis, TECHNOLOGY-Forensics

An Iran-linked advanced persistent threat (APT) group has used fake University of Oxford websites to deliver malware to victims.

Read Full Story

Digital Forensics, Incident Response & Attribution

by Tim Heath on 2017-01-06 03:07PM in NEWS-News Analysis, FREE TO VIEW, TECHNOLOGY-Forensics

The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.

Read Full Story

Sign Up: Cyber Security Intelligence Newsletter: * indicates required