Threats

Explore below to learn more about the growing risk we're seeing across a variety of industries and network segments.

Stay tuned for the latest Cyber adAPT Research commentary on threats in the wild.

Spreading (Devil’s) Ivy

July 19, 2017 — This vulnerability is being dubbed Devil’s Ivy, based on the capability of it being able to spready rapidly across the Internet. Some people are even predicting a WannaCry type infection hitting many Internet connected “smart” devices. This vulnerability was first discovered in a specific brand of Internet connected security cameras.

SambaCry: So you think only Windows is under attack?

July 18, 2017 — Many times, we hear “I don’t need anti-virus because I run a Mac (or Linux)”. Truth of the matter has been stated many times before, all OS have had malware written to target them, the earliest malware like activity was on a mainframe running the CP/M OS. This virus like activity was a ‘game’ called CoreWars.

LeakerLocker: A New Twist on Android Ransomware

July 14, 2017 — This recent malware does not encrypt the device like WannaCry, but rather it reports to collect personal images, messages and browsing history. The malware then LOCKS the phone and threatens to send this data to all your contacts.

Petya Pain

July 12, 2017 — This malware was initially reported infecting the Ukraine, by the end of the day, reports had come in from 64 countries including the United States. As we’ve had time to do additional analysis at this time, this malware is not exactly Ransomware, rather it is more destructive.

SpyDealer in The Root of Things

July 7, 2017 — This malware dubbed SpyDealer has been reportedly active on Android devices for two years. This malware is able to gain control at what is called Root level (the most secure level of Android devices) of Android devices and can collect phone numbers, messages, contact information, call history and connected Wi-Fi data.

More Shadows from the U.S. Government

June 30, 2017 — Recently the group calling itself “Shadow Brokers” released a lot of tools that were created by the U.S. National Security Agency (NSA). These tools are malware and exploits designed to infiltrate and monitor computer networks and computer activities. Previous tools release by the same group gave us the WannaCry, and NotPetya Malware.

Cloud Services

Cloud services are delivering business supporting technology across all sectors at an unprecedented pace — 93 percent of organizations are currently using cloud services according to McAfee. Cloud usage between public and hybrid clouds have transformed the way organizations operate and store information by enabling faster access to their infrastructure and faster time-to-market.

Law Enforcement

If you’re in law enforcement, you are part of that Thin Blue Line that keeps all of us safe. You protect a grateful citizenry (though not always as grateful as we should be!) from a wide variety of criminal threats.

IoT Connections

The Internet of Things (IoT) is transforming organizations and businesses at unparalleled speed. From creation of new business models, automated workflow, real-time functionality, better communication, ubiquitous connectivity, improved customer experience, to reducing expenditures — IoT is having a profound effect worldwide across all business sectors.

Enterprise Mobility

In a highly connected business world that never sleeps, more organizations are turning to the tangible assets of Enterprise Mobility. Cisco’s 2017 Annual Cybersecurity Report shows traffic from wireless and mobile devices will account for two-thirds (66 percent) of total IP traffic by 2020.

Financial

Companies that operate in the financial sector have always faced challenges. It’s not an easy industry. Fickle and fluid financial markets, ever-increasing regulatory pressures, and a host of other risks and potential problems combine to cause some serious headaches for financial executives.

Education

Colleges, universities, and especially K-12 school districts are finding their institutions in a predicament. The booming Bring Your Own Device (BYOD) trend has created mounting data-security concerns as millions of students connect to schools and campuses.

Healthcare

Since 2010, more than 158 healthcare organizations have been compromised through network vulnerability. According to Trend Micro, healthcare was the number one vertical market with the most cyber attacks.

Enter your details and we’ll get back to you