Filters

Ransomware Simulator Script – A tool for testing ransomware defenses

For too long, consumers have been without a method to test the cyber security products that they are purchasing or evaluating. Instead, the products are ‘field tested’ during a real event, at which time it’s revealed that the products didn’t perform as expected. WatchPoint is disrupting the cyber security market by providing all consumers with…
Read More

Raccoon Stealer Malware Service Gaining Popularity

Raccoon Stealer, a new and easy to use trojan malware, is providing cybercriminals with a simple means of stealing credit card data, passwords, and cryptocurrency. The malware has already infected hundreds of thousands of Windows users around the world. (more…)
Read More

BitPaymer Ransomware Making Noise in World of Cybersecurity

Business-to-business payments provider, Billtrust, and German manufacturer, Pilz, were both hit by the ransomware strain dubbed BitPaymer last week. The ransomware has also been spotted exploiting a zero-day vulnerability in the Apple Software Update service.    (more…)
Read More

Ransomware Attacks Continue to Wreak Havoc on the Healthcare Sector

Ransomware attacks have impacted 621 hospitals, healthcare centers, schools, and city entities as of the end of September. Through the ransomware attacks, an estimated $186 million in ransom has been paid, averaging nearly $270,000 per attack. Recently, ten hospitals in the United States and Australia were hit with ransomware attacks, causing one to plan on…
Read More

Ransomware Epidemic or the New Normal?

After several reports last year that showed ransomware attacks were in decline, a new report from McAfee shows attacks have doubled in 2019. The ‘epidemic’ we have been experiencing over the last couple of years may now just be the new normal. With the declining value of information gained from data breaches, hackers have resorted…
Read More

Ransomware Fall-Out of Lake City, Florida

The Long Reach of a Ransomware Fall-Out Earlier this year, Lake City Florida was the victim of a ransomware attack. Like companies across the world, the city was infected by the ransomware variant, Ryuk. But it wasn’t just the city that took a hit. The city’s IT Director, Brian Hawkins, also entered the firing line.…
Read More

Fortnite Targeted by Syrk Ransomware

Fortnite, the second most popular video game of 2019, has been targeted by a ransomware variant dubbed as Syrk. Promising players an ‘aimbot’ for aiming more accurately while playing, and ‘ESP’ for discovering other player’s locations in the game, Syrk has a prospect list of over 250 million gamers. Instead of delivering the promises above,…
Read More

Test CryptoStopper – Ransomware Simulator

  TestCryptoStopper.exe was developed for use with CryptoStopper™.  We wanted to give our customers a safe and easy way to test the effectiveness of CryptoStopper™ against a ransomware attack.   (more…)
Read More

RDP Brute Force Attack Detection and Blacklisting with Powershell

Overview Monitoring systems provide great value because they alert us to unusual events. They allow us to check a box on our audit sheet, but really a monitoring system is just half of the equation. The other half of the equation requires an action in response to the event. {{cta(‘eb06e7c8-c2f2-4a8f-986c-028c4223e9df’,’justifycenter’)}} Last week’s Tip-of-the-Week provided a…
Read More

Using Group Policy to Disable Show Hidden Files

There are thousands of hidden files on your workstation that were installed with your applications and operating system that you probably are not aware exist. Deleting these hidden files could be catastrophic, so keeping these files safe and hidden is important. If you discover certain hidden files and attempt to delete or alter them, there could…
Read More
Menu