Skeleton Key Malware Analysis | Secureworks
Sunday, 20 October 2019
Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 12 January 2015 Summary Dell SecureWorks Counter Threat Unit(TM) (CTU) researchers discovered malware that bypasses authentication on Active Directory (AD) systems that implement single-factor (password only) authentication. Threat actors can use a password of their choosing to authenticate as any user. This malware was given the
- Published in Threats, Threats Analysis
3 Comments
Key Biscayne Hit by Cybersecurity Attack
Saturday, 29 June 2019
Key Biscayne is the third Florida town to be hit by hackers in June. A third small Florida town has been hit with a June cyberattack. Key Biscayne, a village of some 13,000 residents, has confirmed that it suffered a “data security event” on Sunday, June 23. According to reports in local media, all village
- Published in Attacks
Cyber Security 2019: 6 Key Mid-Year Updates
Wednesday, 26 June 2019
Register In June, we set out to explore how 2019 is going with a mid-year survey. We wondered are the issues, problems and concerns first identified in our November 2018 report still true? Have priorities changed? Has focus shifted? We have compiled the results that reveal a snapshot of the challenges, focuses, and spend in
- Published in Strategies
As Cloud Adoption Grows, DLP Remains Key Challenge
Wednesday, 19 June 2019
As businesses use the cloud to fuel growth, many fail to enforce data loss prevention or control how people share data. The cloud is no longer a mystery to today’s companies, which capitalize on its benefits to fuel growth, but securing cloud-based data, applications, and infrastructure remains a challenge. As part of its most recent
- Published in Strategies
6 Key Tips to Keep in Mind
Saturday, 23 March 2019
Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach. 1 of 7 (Image: Jcomp stock.adobe.com) Most data breaches we see in the headlines are the biggest – but a security incident doesn’t need to be of Equifax proportions to bring
- Published in Attacks
Trust, or Lack of It, Is a Key Theme on RSAC …
Wednesday, 06 March 2019
Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders. RSA CONFERENCE – SAN FRANCISCO – The need for trust — in machines, in systems, and in one another — was a
- Published in Strategies
6 Key Principles to Keep in Mind
Thursday, 31 January 2019
Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come. 1 of 8 In an industry of constant, rapid change, an old-school security tool remains an effective piece of an overall security. Access Control Lists (ACLs) that specify precise rules for
- Published in Threat Defense, Threats
6 Key Principals to Keep in Mind
Wednesday, 30 January 2019
Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come. 1 of 8 In an industry of constant, rapid change, an old-school security tool remains an effective piece of an overall security. Access Control Lists (ACLs) that specify precise rules for
- Published in Threat Defense, Threats
Cutting Through the Jargon of AI & ML: 5 Key Issues
Thursday, 10 January 2019
Ask the tough questions before you invest in artificial intelligence and machine learning technology. The security of your enterprise depends on it. When looking at the artificial intelligence (AI) and machine learning (ML) components of information security products, it’s easy to get overwhelmed by the glut of marketing buzzwords. As a decision maker, how do
- Published in Strategies