Karmen Ransomware-as-a-Service flawed

Karmen is a new RaaS (Ransomware as a Service) being offered in the underground forum. According to a recent research from Recorded Future, this ransomware is being advertised and sold in a […]

April 24, 2017 by Paul Kimayong

New Breed of Cerber Ransomware Employs Anti-Sandbox Armoring

Most sandboxes typically have some API monitoring module to be able to identify and describe what the program is trying to do. In order to do this, they hook APIs […]

April 12, 2017 by Paul Kimayong

Avoid the Click Bait: Secure your Email from Ransomware & Spear Phishing Attacks

Exciting new technological innovations are changing our lifestyle everyday, and so are the new types of cyber threats making us more vulnerable. When we worry about the possibility of our […]

April 11, 2017 by Suba Pandian

From Zero-Day to Zero Privacy

I recently participated in a panel hosted by ITSP Magazine about #Vault7. For background, on March 7, WikiLeaks posted the “largest ever publication of confidential documents” from the CIA, that […]

March 23, 2017 by Nick Bilogorskiy

The Case for Behavioral Analysis

In this article, we will lay out arguments with real-life examples in support of behavioral detection of malware as opposed to more traditional static methods of detection. For the sake […]

February 28, 2017 by Mounir Hahad

A Contrarian Approach to Cybersecurity – Less is More

In a recent print edition of The Economist, there is a very relevant article – “Modeling Brains: Does not compute.” It provides a cautionary tale about promises of modern brain […]

January 31, 2017 by Manoj Leelanivas

DDoS and The Internet of Things

In the last few days, we heard a lot about the Mirai Internet-of-Things botnet, which caused a DDoS attack against Dyn. But Mirai is a relatively small botnet because the majority […]

November 3, 2016 by Alex Burt

Avoid the Click Bait: Secure your Email from Ransomware & Spear Phishing Attacks

Exciting new technological innovations are changing our lifestyle everyday, and so are the new types of cyber threats making us more vulnerable. When we worry about the possibility of our […]

April 11, 2017 by Suba Pandian

RIG Exploit Kit says “I Do”

Cyphort Labs discovered a new attack campaign that links to malicious exploits from hijacked DNS servers of personal wedding websites. Personal wedding websites are used to aid in planning and communicating important details for a […]

October 24, 2016 by Nick Bilogorskiy

Buhtrap Malware: What Every Bank’s Security Team Needs To Know

In our recent blog, we talked about the delivery of Buhtrap by using compromised website and a recent web exploit. On this blog, we will focus on the second stage […]

October 13, 2016 by Paul Kimayong

Banking Malware Buhtrap Caught in Action

What is Buhtrap? Buhtrap is a criminal cyber hacking group that targets financial institutions. As reported by Group-IB, Buhtrap has been active since 2014. From August 2015 to February 2016, it managed to conduct 13 successful attacks against […]

September 23, 2016 by Dhruval Gandhi

See the Anti-SIEM in Action.

Schedule a live demo at your convenience, and we’ll present the detection, analytics, and mitigation capabilities of the platform.