hack


Security has typically fallen under the purview of IT, but it’s time to elevate it to a C-suite level discussion. Seemingly every time we turn around there’s something in the news or on social media about high-profile companies like Target, Sony Pictures, Home Depot and JP Morgan Chase experiencing data breaches -- making them almost commonplace and lowering their shock value as a result. Yet, that’s a compelling reason why organizations need to come together and discuss how to protect their network infrastructure. It’s no... [Read More]
by RSS Esther Shein  |  Jun 10, 2015  |  Filed in: Industry Trends
The Premera Blue Cross hack is a reminder of the treasure trove healthcare data represents to hackers. Bank account information. Physical addresses. Email addresses. Social Security numbers. Clinical information...All exposed in the latest healthcare cyberattack. This time the target was Premera Blue Cross, a Pacific Northwest health insurer, which reported Tuesday that up to 11 million patient records had been breached. According to Premera, the breach was discovered on January 29th, the same day that Anthem Blue Cross uncovered a breach... [Read More]
by RSS Ryan Witt  |  Mar 18, 2015  |  Filed in: Industry Trends
By now we've read the details of the Target breach. Attackers got away with home, email and credit card information from 70 million people (Source). How many people is that in the big scheme of things? According to a U.S. Census Bureau report from 2012, it's close to every single living person in the states of California (38.05 million), Texas (26.06 million) and Washington (6.897 million). In fact, the Target breach has impacted one of my close colleagues, who explained to me the safety precautions taken by his credit card company. It should... [Read More]
by RSS Rick Popko  |  Jan 17, 2014  |  Filed in: Industry Trends
Shortly after 10:00am Jun 25th 2013, many government websites from South Korea were not accessible. It was actually caused by the malware performing ddos attack on 2 major DNS servers (ns.gcc.go.kr and ns2.gcc.go.kr). Original Attack Vector During the investigation, we managed to find the original attack sample which was served by a compromised website at that time (simdisk.co.kr). The downloaded file named SimDisk_setup.exe turned out to be a self-extracting RAR file. In this SFX RAR file were sitting 2 files: Simdiskup.exe file SimDiskup.exe... [Read More]
by RSS Kyle Yang  |  Jul 14, 2013  |  Filed in: Security Research