Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Honeypot Recon: New Variant of SkidMap Targeting Redis

Since Redis is becoming increasingly popular around the world, we decided to investigate attacks on the Redis instance. We didn’t have to wait long for the first results of the Honeypot. The trap caught an activity about which the Western world does not hear too often while analyzing SkidMap. More importantly, this variant turned out to be a new, improved, dangerous variation of the malware. Its level of sophistication surprised us quite a bit.

What Is Cybercrime: The Different Types You Need to Look Out For

The question “What is cybercrime?” is more critical today than ever. Advancements in tech, oversharing on social media, and even the latest AI innovations have significantly increased the risk of cyberattacks. Just look at the statistics. Ransomware attacks grew by 92.7% in 2021 compared to 2020. As internet connectivity and usage grow globally, cybercriminals are becoming more brazen in targeting unsuspecting victims.

WannaCry Ransomware Attack: What, Who, Why, When, & How to Stay Protected?

The May 12, 2017, WannaCry ransomware attack was one of the most devastating and globally widespread computer infections. The next WannaCry is prepared and about to occur in 2023, claims Kaspersky. The potential reason is that the biggest and most devastating cyber epidemics happen every six to seven years. Here are some helpful tips to stay protected against WannaCry ransomware.

Detecting Storm-0558 using Corelight evidence

While there have been many intrusions, compromises, breaches, and incidents that have made news in the IT and InfoSec industries throughout 2022 and into this year, when events or threats like Storm-0558 gain coverage by mainstream media, we often get questions about Corelight’s ability to detect threats through our sensors, products & platform.

Cloak Ransomware: Who's Behind the Cloak?

Emerging between late 2022 and the beginning of 2023, Cloak Ransomware is a new ransomware group. Despite its activities, the origins and organizational structure of the group remain unknown. According to data from the group’s DLS (data leak site), Cloak has accessed 23 databases of small-medium businesses, selling 21 of them so far. Out of these, 21 victims paid the ransom and had their data deleted, 1 declined and 1 is still in negotiations, indicating a high payment rate of 91-96%.

What Is Scareware?

Scareware is a type of social engineering cyberattack that uses psychological manipulation to trick victims into downloading malware disguised as antivirus software. Cybercriminals trick users with frightening, urgent messages in pop-ups or emails which claim their computer is infected. Continue reading to learn how scareware attacks work, how to avoid falling victim to them and how to remove scareware from your devices.

Healthcare Threat Landscape 2022-2023: Common TTPs Used by Top Ransomware Groups Targeting the Healthcare Sector

The healthcare sector has been under constant threat from cybercriminals due to the sensitive nature of patient data and the valuable information held by healthcare providers. This blog analyzes the ransomware landscape for the healthcare sector for the years 2022-2023. This report uses data compiled for the recently released Trustwave SpiderLabs research: Cybersecurity in the Healthcare Industry: Actionable Intelligence for an Active Threat Landscape report.