Tracking Cyber Exposure

Tracking cyber exposure requires detailed investigation to understand how a network has been breached and what data has been exposed to attackers. The following post explains how CYDEF investigates cyber exposure using our proprietary tool, SMART-Sentinel. 2020: Ending with a Surge of Breaches In the final months of 2020, global networks were inundated by a

By |2021-01-14T14:10:32+00:00December 31st, 2020|Security Analysis, Threat Hunting|

Adrozek Silently Alters Search Results in Web Browsers

Adrozek, a drive by download attack, may be impacting your business’s browsers. From desktops to laptops to mobile devices, your endpoint security should be assessed. Detecting Adrozek’s Malicious Adware On December 10th, 2020, Microsoft announced detection of the malicious adware Adrozek on a variety of browsers, including Microsoft Edge, Google Chrome, Yandex Browser, and Mozilla

By |2020-12-22T17:21:48+00:00December 17th, 2020|Security Analysis, Threat Hunting|

Risk Management: The Strongest Cybersecurity Tactic

Prevention is Not the (Only) Cure Risk management is the strongest cybersecurity tactic, outweighing the roles of prevention and detection. Our clients often indicate they’re looking for a solution that detects and blocks threats, while preventing infection. This may seem perfectly natural upon first glance. After all, what’s the point of detecting malware once your network is infected? An

By |2020-12-10T15:38:37+00:00December 10th, 2020|Security Analysis, Threat Hunting|

Defence in Depth as a Cyber Risk Prevention Tactic

On the Relationship Between Cheese and Risk  In cybersecurity, there is a lot of talk of “defence in depth”, but sometimes it is unclear what people mean… or why you should care.   This post answers questions about the concept of “defence in depth”, with unexpected help from a famous cheese family.   What is defence in depth?  Like many concepts in cybersecurity, defence in

By |2020-12-10T15:37:47+00:00December 3rd, 2020|Security Analysis, Threat Hunting|

What is SASE?

Secure access, secure edge (SASE) is the hot ticket cybersecurity. Do you understand the benefits? Introducing: SASE Whenever sales of security products dip, vendors leverage buzzwords in an effort to explain business problems. They push the buzzword hard for a short while, just long enough for people to buy it and figure out the claims

By |2020-12-03T16:42:45+00:00November 12th, 2020|Security Analysis, Threat Hunting|

Cybersecurity Countermeasures: Barriers to Risk Management

A discussion of The Law of Diminishing Returns and Cybersecurity Investment. The Cybersecurity Price Quandary A reasonably good anti-virus product with a bundled firewall can be acquired for less than a dollar per month. Some companies pay double that for an advanced endpoint detection product or a managed detection service. Larger companies frequently spend thousands

By |2020-12-03T16:39:21+00:00October 29th, 2020|Security Analysis, Threat Hunting|

Combatting Cyber Alert Fatigue

The more endpoint breach alerts that sound, the less responsive a cybersecurity team becomes. The likelihood of an endpoint breach increases. Distinguishing Important Alerts from Noise Everyone experiences alert fatigue. Alert fatigue is such a common problem that it dates as far back as Aesop’s Fable from the 6th century BC: There once was a shepherd

By |2020-12-07T15:47:38+00:00October 15th, 2020|Security Analysis, Threat Hunting|

Responding to Dridex

An analysis of Dridex, the 'banking' malware that steals credentials AND grows more sophisticated/discrete over time. How CYDEF Responded to a Dridex Attack The Dridex trojan posed a significant threat to major financial institutions since its identification in 2011. Unlike most malware, Dridex continuously evolves, growing more sophisticated over time and escaping detection by hiding

By |2020-12-03T16:26:47+00:00October 1st, 2020|Security Analysis, Threat Hunting|

Building Partnerships for Strong Cybersecurity

As Managed Service Providers (MSPs) grow increasingly popular amongst small and medium businesses, they’ve also become a target for cybercriminals. In 2019, at least 13 MSPs were hacked. Successfully breaching an MSP’s environment provides attackers with access to corporate data from a range of enterprises – a veritable boon of sensitive information. Vulnerability Management Required

By |2020-12-03T16:12:15+00:00September 24th, 2020|Managed Service Providers, Threat Hunting|

Detecting Astaroth with SMART-Sentinel

An analysis of Astaroth, the info-stealing malware that uses multiple fileless techniques to install on a computer and steal passwords. Malware of the day: Astaroth Whenever a new malware or a novel attack technique is discovered, our clients worry about how it could affect them. Many come to us asking: “Am I protected against this

By |2020-12-03T16:23:16+00:00September 3rd, 2020|Security Analysis, Threat Hunting|
Go to Top