Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Last Friday, a massive ransomware attack struck organizations in at least 100 countries. The attack, named WannaCry, exploited code from the NSA and ransomware paired with a worm to hold more than 200,000 machines at ransom, demanding payment from its victims in exchange for their files.
In today’s webinar, we shared our latest findings on WannaCry and provided some additional context around the short-term implications of the attack – including the possibility of new WannaCry variants and reuse of the DoublePulsar backdoor. We then offered our forecast for what this could mean for the future. Here’s a re-cap.
We’re hopeful that organizations will significantly alter their continuous patch hygiene. Microsoft has even released new emergency patches for Windows XP and 2003, which speaks to the seriousness of the event and the risk of deploying out-of-date operating systems in production environments.
We haven’t heard the last of the Shadow Brokers. The hacking group claims to have more tools and information that have been stolen from the US Intelligence Community. As they expose new “cyber weapons” that are being adopted by opportunistic threat actors, all of a sudden everyone is at risk.
TheWannaCry story will inspire a new set of attacks. They won’t all necessarily be ransomware, but it remains to be the most hyper-productive model for cybercriminals in terms of monetizing attacks.
Knowing how quickly worm-based attacks can do massive damage, there is potential for physical damage to infrastructure as we move to IoT. This becomes something that we have to decide how we’re going to manage risk. The lack of focus or preparedness for IoT cybersecurity puts everyone at increased risk.
With infrastructure that is globally connected and the challenge of patch management, fast-spreading threats can cause massive damage. Especially to embedded systems where there is not ongoing support for vulnerabilities. Plus, future attacks will involve less and less human intervention.
There’s an attack vs. defense asymmetry in that it’s really easy to for attackers to attack, and really difficult for organizations to respond. Organizations will be on their own, unless they start to build out their trust circles and collaborate on how to defend against threats.
We have to be mindful about attributing attacks to specific geographies or state-entities. In this case, officials have stated that Russia was considered to be the most attacked. But if we think that a political opponent will retaliate, that could mean cyberwarfare against everybody.
As we shared in the webinar, the best way for organizations to significantly reduce their risk is to harden their security posture. Start by ensuring these best practices are part of your overall cybersecurity approach.
We used to see longer periods of time between big attacks, which gave organizations time to detect, analyze and remediate the threat accordingly; establish or reinforce cybersecurity best practices; and frankly, get back to work.
But now, with the steady increase in the cadence of attacks, cybersecurity must become engrained in daily business operations. From actively monitoring security alerts to enacting new internal policies, progressive organizations are prioritizing the problem to protect not only their data, but their bottom lines.
With new insights from CTO, Mark McArdle and Director of Threat Intelligence at eSentire, Viktors Engelbrehts, the webinar provides an in-depth explanation of the following:
Katie is a content strategist on the Marketing team at eSentire. With a background in B2B marketing and communications, Katie helps drive the company narrative via engaging and informative content.