Learning & Resource Center

Articles

Most Popular Posts

IOCs Associated with Ranzy Locker Ransomware

The FBI first identified Ranzy Locker ransomware in late 2020 when the variant began to target victims in the United States. Unknown cyber criminals using Ranzy Locker ransomware had compromised more than 30 US businesses as of July 2021. The victims include the...

Conti Ransomware

While Conti is considered a ransomware-as-a-service (RaaS) model ransomware variant, there is variation in its structure that differentiates it from a typical affiliate model. It is likely that Conti developers pay the deployer's of the ransomware a wage rather than a...

BlackMatter Ransomware

This advisory provides information on cyber actor tactics, techniques, and procedures (TTPs) obtained from a sample of BlackMatter ransomware analyzed in a sandbox environment as well from trusted third-party reporting. Using embedded, previously compromised...

Indicators of Compromise Associated with IcedID

FBI reporting has indicated a recent increase in IcedID malware acting as a “dropper,” infecting victims with additional malware. Examples of ransomware variants dropped by IcedID include Defray777, GlobeImposter, Cuba, Conti, and REvil (aka Sodinokibi). First...

Malware Analysis – AppleJeus: Dorusio

This Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber threat to cryptocurrency...

Malware Analysis – AppleJeus: Kupay Wallet

This Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber threat to cryptocurrency...

Articles

Advisories

Articles

Research & Situational Awareness

CVE-2022-30190 aka Follina

Move over log4j, there is a new 0-day vulnerability being exploited in the wild. The first sample that exploits the vulnerability appeared on VirusTotal on April 12th, 2022. Successful exploitation allows an attacker to run arbitrary code with the privileges of the...

Articles

Company News

Fortify is at #blackhat this week! If you’re there too, reach out and let’s connect. #blackhat #lasvegas #cybersecuritymanaged
6 0
Scott Schiefelbein, Managing Director and expert in law and tax joins the Enterprise Blockchain Club next Monday, January 9th at 6PM Pacific time. Olympic Mills, 7th floor. Zoom for remote attendees!

http://bit.ly/3QkfBZT
0 2
Hope everyone has a happy Thanksgiving 🦃 #greatful #thankful
6 0
Hope everyone has a fantastic holiday #staysafe #stayhome
9 0
It’s that time of year of again. Everyone is traveling, waits are longer and stress is higher. From Boarding passes to our entertainment, it is all stored on our devices. Having a charge can be crucial but is public USB charging still safe?
.
“Juice-Jacking” from USB charging stations are the latest warning threat. The LA district attorney advisory states, “…they may infect the phones and other electronic devices of unsuspecting users,” it reads. “The malware may lock the device or export data and passwords directly to the scammer.”
.
Here’s the thing though, no one really knows of any known cases on the books except maybe, possibly on the east coast. So why the advisory? The spokesperson said it was part of “an ongoing fraud education campaign.” They go on to say they have seen proof-of-concepts but nothing active. It’s not a crazy concept though. Plug your phone in, boom infection and all your information stolen. . 
There will always be new threats so what do you do? Carry your own charging cords. Don’t borrow from a stranger. (hackers can rig a cord). Use an AC power outlet not a USB charging station or have a portable charger. Have 2 Factor Authentication. As we always advise, your devices should be protected with the right software. Reach out to the link our bio to help find the right one for you.
.
#cybersecuritymanaged #fortify24x7 #newtechnology #smarttechnology #techie #fasttechnology #technologynews #technologystats #juicejacking #hacking #holidaytravel #cybersecuritynews #cybersecurity #ai #artificialintelligence #BeCyberSmart #CyberAware
15 1
This error message is only visible to WordPress admins
There has been a problem with your Instagram Feed.