Threat of Intelligence Report: Phish Point

Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence is explaining the role it plays within cyber-security and network defence, while offering advice and best practice. This will equip the reader with a basic understanding of the benefits of threat intelligence and the importance of investing effort and resources into responding to it.

Canary Honeypot – What is it?

When attackers have breached your network, one of the first actions they will take is to passively fingerprint the network to see what might be good to exfiltrate or encrypt.  When we detect any activity with the Canary or it’s associated files, we will be alerted therefore enabling further investigation by our analysts and, if we find it to be a true positive, we will let you know.

Why Volume Licensing is Bad for Protective Monitoring

Volume licensing is essentially a consumption-based pricing model: you pay for what you use. Traditional, on-premises SIEM (Security Information & Event Management) solutions usually operate on this basis, which has a number of key drawbacks for businesses:

Looking Forward: IT Security Trends for 2019

Protecting an organisation from cyber crime is a relentless task, as both security solutions and means to attack continue to evolve. The repercussions of a security ‘incident’ can be costly, in terms of financial loss, data recovery and damage to reputation.

Top 5 Cyber Threats in Higher Education

The threat landscape in the education sector comprises two distinct types of breach: deliberate and accidental. While it is not possible to remove these risks entirely, taking preventative steps and having a robust response system in place will help protect your organisation.

Threat Intelligence Report: Syn/Ack

We have been made aware of the latest form of ransomware to threaten organisations. SynAck ransomware adopts a new technique to infect computers – the ‘Doppelgänger’ approach. With the aim of infecting systems and encrypting victims’ files, SynAck uses this approach to transform files in order to bypass and avoid detection from anti-virus software. A demand is then made for a fee in order to release the files.

Threat Intelligence Report: FacexWorm

The invinsec Threat Intelligence Analysts have discovered a new malware exploit that is being seen on the web (researchers first discovered the exploit in August 2017 and immediately after, it was removed from the Chrome Web Store). In April 2018, researchers discovered a repackaged version of the malware with a few tweaks which had the additional capability to steal Facebook, Google and Cryptocurrency credentials amongst others.

Whitepaper: Managing your security monitoring requirements using invinsec’s next generation intuitive Security Operations Centre (SOC)

We’re pleased to present our intuitive Security Operations Centre (SOC) solution built to exceed the National Cyber Security Centre (NCSC)’s security monitoring requirements, the Payment Card Industry Data Security Standard … Continue reading Whitepaper: Managing your security monitoring requirements using invinsec’s next generation intuitive Security Operations Centre (SOC)

You’ll probably shortly be reading about a new piece of nastiness in security called Bashware:

https://blog.checkpoint.com/2017/09/11/beware-bashware-new-method-malware-bypass-security-solutions/ It is picking up a lot of chatter amongst the security and IT community, and we suspect will soon be as widely spoken about as HeartBleed. Criminals are exploiting … Continue reading You’ll probably shortly be reading about a new piece of nastiness in security called Bashware: