Stegoloader: A Wolf in Sheep’s Clothing
Dell SecureWorks Counter Threat Unit™ (CTU) researchers analyzed a stealthy malware family named Stegoloader that has been active since at least 2013 and yet is relatively unknown. It has been...
View ArticleVertical Hopscotch
Dell SecureWorks Counter Threat UnitTM (CTU) researchers have previously discussed ways for enterprises to exploit threat intelligence to better detect and respond to compromises. IT professionals...
View ArticleSmall Businesses Suffer Many Breaches
Good things come in little packages. That’s why cyber-thieves go after small businesses. Although it’s rare to read a story about a business that was breached that isn’t a national company, small...
View ArticleCyber Security Table Stakes for Companies: The Bare Minimum Needed to Survive
Can Your Company Survive Without Information Security? Nobody ever said now that the company is doing well, let’s drop the CEO and CFO and use that money for other things like R&D or new products....
View ArticleThis Just In: What Tomorrow’s Breach Means For You
Another day, another headline – another breach. Whether you’re securing your company or your identity, with each compromising headline, we ask ourselves how we’ll be impacted, how it happened and how...
View ArticleA Breach is Just One Click Away – How to Use Training and Technology to...
If you’ve read our blog or followed us on LinkedIn or Twitter, you probably know we talk a lot about security awareness training. You might have attended our security awareness training webcast and...
View ArticleVisit Dell SecureWorks at Black Hat USA
Black Hat USA 2015, one of the world’s most technical and relevant global information security events, is approaching, and Dell SecureWorks will be there to offer insights about the current...
View ArticleTechnical Analysis Tracks the Sakula Malware Family
Dell SecureWorks Counter Threat Unit™ (CTU) researchers conducted a longitudinal analysis of the malware family called Sakula (also known as Sakurel and VIPER), which targeted organizations in...
View ArticleRevealing the Cyber-Kraken
Few security researchers possess the skills to detect elusive threat actors and gather the evidence of Advanced Persistent Threat (APT) groups lurking beneath the surface of legitimate-appearing...
View ArticleNegative Feedback – Attack on a YouTube Channel
Recently, one of my favorite YouTube channels, Dave Jones’ EEVblog, came under attack after having published a series of videos debunking a product claiming to vastly extend the life of alkaline...
View ArticleWalk, Don’t Run: A Security Framework for a Healthy Network (Part 1)
Just as no business becomes an overnight sensation, neither does an organization’s security posture. Security is a process, not a destination. It takes time, patience and hard work. You must start...
View ArticleWalk, Don’t Run: A Security Framework for a Healthy Network (Part 2)
Just as no business becomes an overnight sensation, neither does an organization’s security posture. It takes time, patience and hard work. You must start with the basics, work up to advanced moves and...
View ArticleFake Profiles, Fake Networks, Real Threat: Suspected Iran-Based Cyber Threat...
Figure 1. Cartoon about Internet identity published in The New Yorker. (Source: Peter Steiner The New Yorker Collection/The Cartoon Bank) Trust and identity on the Internet are ongoing issues. As...
View ArticleThere’s a Weakness in Your Organization’s Security – It’s You
It’s football season. You’ve got your media room, your grill, and your beer-stocked fridge. Your fantasy team has been drafted, and you’re ready for Sunday’s game, eager to ridicule your friends as...
View ArticleWalk, Don’t Run: A Security Framework for a Healthy Network (Part 3)
Just as no business becomes an overnight sensation, neither does an organization’s security posture. It takes time, patience and hard work. You must start with the basics, work up to advanced moves and...
View ArticleHow to Avoid Common Security Pitfalls While Staying Constantly Connected
The benefits of mobile devices and public computers are endless, but that constant connectivity doesn’t come without risks. If you don’t take security precautions, your device could become infected. If...
View ArticleCover Their Tracks: How Attackers are Hiding C&C Communication
Staying hidden is one of the primary goals of an attacker, making the arms race between cybercriminals and security professionals a never-ending battle. At the recent Black Hat Europe 2015 conference...
View ArticleAre Boards Missing an Opportunity to Mitigate Cybersecurity Risk?
You can’t read a corporate governance publication or blog today without getting advice about the board of directors’ role in incident response planning. It’s an expected reaction as corporate officers...
View ArticleConcerns Regarding eDellroot Certificate
Although Dell SecureWorks was not engaged to test this particular customer support component (eg: the on-the-box support certificate), Dell has a robust product development and testing cycle that we...
View ArticleSix Tips for Protecting Yourself When Holiday Shopping
Black Friday and Cyber Monday saw record traffic and record online sales. But merchants selling their wares are not the only ones who took notice – nefarious individuals hoping to perpetrate fraud for...
View Article
More Pages to Explore .....