The file encryption and MBR infection code of NotPetya has now been carefully scrutinized and found lacking in many respects, sparking debate among researchers as to the true intent of the threat actors.
We recently released our Q1 Midmarket Threat Summary Report, which analyzes threat activity across multiple industries, as observed by our Security Operations Center (SOC).
Today, cybercriminals commonly use inexpensive, automated methods of intrusions, which have been very successful when used to target midsized organizations.
In the current cybersecurity threat landscape, we see most botnets propagating via exploits and file-based malware. Anything that touches the disk has the ability to be blocked via access controls on the host.
Gartner had identified managed detection and response (MDR) as the next evolution of threat monitoring and incident response services.
Keeping up with the latest cybersecurity services and technologies can be challenging. Learn what to look for when evaluating MDR providers.
Learn about the long-term impact of WannaCry and how to protect your organization against future attacks.