Date: 12 April 2019 Summary During Invinsec proactive threat hunting, malware Command and Control (C2) connection attempts were observed, originating from hosts infected with Feodo malware. Customers who had … Continue reading Threat Intelligence Report: Feodo C&C Botnet
Date: 29 March 2019 Summary: A Zero-Day Vulnerability has recently been discovered in WinRAR. The vulnerability, which was assigned as CVE-2018-20250, allows attackers to set arbitrary destinations during file extraction … Continue reading Threat Intelligence Report: WinRAR Zero Day Threat
During February half term 2019 I was given the amazing opportunity to spend the day with Invinsec Ltd in Cheltenham. Aled Jones, Director of Customer Success, organised a well-planned day … Continue reading Work Experience Day at Invinsec
Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence is explaining the role it plays within cyber-security and network defence, while offering advice and best practice. This will equip the reader with a basic understanding of the benefits of threat intelligence and the importance of investing effort and resources into responding to it.
When attackers have breached your network, one of the first actions they will take is to passively fingerprint the network to see what might be good to exfiltrate or encrypt. When we detect any activity with the Canary or it’s associated files, we will be alerted therefore enabling further investigation by our analysts and, if we find it to be a true positive, we will let you know.
Volume licensing is essentially a consumption-based pricing model: you pay for what you use. Traditional, on-premises SIEM (Security Information & Event Management) solutions usually operate on this basis, which has a number of key drawbacks for businesses:
Protecting an organisation from cyber crime is a relentless task, as both security solutions and means to attack continue to evolve. The repercussions of a security ‘incident’ can be costly, in terms of financial loss, data recovery and damage to reputation.
The threat landscape in the education sector comprises two distinct types of breach: deliberate and accidental. While it is not possible to remove these risks entirely, taking preventative steps and having a robust response system in place will help protect your organisation.
Businesses used to worry about break-ins. But now, criminals are more likely to come in through your inbox than a side door or window late at night. Cyber criminals want your data, your customer’s data, bank details, sensitive financial information and intellectual property.