Malware reverse engineering - All you need to know

Among all threats, the one that keeps organizations on their toes is malware. When a system is discovered being infected with malware, organizations want to know how it must have impacted the system, if the threat is ongoing and what data would they have lost to malware. While these are indeed tough questions, reverse engineering helps them tide over these challenges and gives them the edge to take action well in time.


Malware Sandboxing 101: The Ultimate Guide

The enterprise security architecture is under constant threat, thanks to the persistent sophistication of evasive malware that has the potential to cripple the cybersecurity framework of businesses. Even the most superior commercial malware analysis tools often fail to recognize and analyze unforeseen intrusions. The reason? - Advanced Persistent Threats (APTs)


Apple-Notarized Malware: What It Is and How It Affects Mac Users

Malicious actors are targeting Apple. Although Apple introduced a notarization mechanism to scan and prevent malicious code from running on Apple devices, attackers have found ways to circumvent this process. Such Apple-notarized malware constitutes a threat to macOS users. Let us start by exploring what Apple notarization is. We will then discuss some recent examples of Apple-notarized malware and some prevention techniques.


Signs Your Organisation is at Risk of a Ransomware Attack | Anlyz

According to Cybersecurity Ventures, a new organisation is going to be vulnerable to a ransomware attack every 11 seconds by 2021. Behind these rising numbers of ransomware threats are cybercriminals who are increasingly pushing these malicious file-encrypting elements into enterprise systems and networks.


How can SOAR cybersecurity help fight Phishing | Anlyz

In the cybersecurity domain, phishing is not a new matter of concern. In our previous blog posts, we have talked about the rising sophistication of modern threat elements. But the nature of data breaches and malware infections due to phishing has remained the same since the time cybercrime gained momentum. This loosely translates to the fact that there has been a lack of efficient phishing mitigation tools in the disposal of enterprise security teams.


Zero-day exploits - malware analysis tools | Anlyz

Did you know that information and sensitive data loss accounts for 43% of the recovery costs after a cyber attack has taken place? According to Cybercrime Magazine, the cybercrime landscape is quickly becoming more profitable than the illegal drug trade! Indeed, data is the new fuel. As per estimates, it is known that enterprises take almost six months to realize that there has been a data breach.


Types of malware analysis procedures | Anlyz

Did you know that 4.1 billion sensitive records were exposed in the first half of 2019 due to data breaches? Poor cybersecurity practices and the lack of awareness about the growing sophistication of threat elements are still the primary reasons for malware intrusions into enterprise systems. Cybercriminals are becoming increasingly efficient in packaging the malicious entities in forms that do not raise suspicion - for instance, an MS Word file or an email attachment.


Healthcare Orgs: What You Need to Know About TrickBot and Ryuk

In late October, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) co-authored an advisory report on the latest tactics used by cybercriminals to target the Healthcare and Public Health (HPH) sector. In the report, CISA, FBI, and HHS noted the discovery of, “…credible information of an increased and imminent cybercrime threat to U.S.


Stories from the SOC - Multi-layered defense detects Windows Trojan

Malware infections are common and are often missed by antivirus software. Their impact to critical infrastructure and applications can be devastating to an organization's network, brand and customers if not remediated. With the everchanging nature of cyberattacks, organizations need a layered security strategy. They shouldn’t depend solely on a single layer of security to keep them protected.


Successful Ransomware Attacks on Education Sector Grew 388% in Q3 2020

The number of successful ransomware attacks on the education sector increased 388% in the third quarter of 2020. According to Emsisoft, the education sector reported 31 ransomware incidents in Q3 2020. That’s a 388% increase over the 8 incidents that occurred in the previous quarter. Nine of the 31 ransomware attacks disclosed in the third quarter of the year involved data exfiltration, a tactic which has become common with ransomware gangs over the past year.