-
- 09/09/2020
- Cyber Hunter
Measuring Cyber Security Success
The call for measuring cyber security success - the ability to provide information metrics about the posture of the network, which can be used to assess the level of threats, and to decide when to heighten security postures due to perceived risks. Often this can be a misunderstood philoso...Read more
-
- 08/26/2020
- Cyber Hunter
Vishing – a Growing Tradecraft
Recent reporting has shown an increase in social engineering campaigns for Vishing “voice phishing.” These attacks manipulate computer users into giving out confidential user information via a phone call. In most cases, the attackers use stolen credentials to mine the victim company d...Read more
-
- 08/19/2020
- Cyber Hunter
Managing Cyber Risk
All businesses are reliant on digital resources for operations. However, using those resources can add unknown risks to business operations. Cyber risk management is about managing the effects of uncertainty on business operations by reviewing current security processes and technologies. ...Read more
-
- 07/31/2017
- Cyber Hunter
Banking Keylogger leverages EmpireShell Framework
Introduction In the beginning of July 2017, ActiveCanopy Cyber Operations Center was called to support an incident response for a healthcare network system. During the incident response, a malicious file was identified on a compromised host on the network system. After some investigati...Read more
-
- 06/02/2017
- Cyber Hunter
Hackers Favorite Phishing Spot
The growth of phishing attacks in both frequency and sophistication continue to be a high threat with tradecraft showcasing deceptive, spear, and fraudulent techniques in one campaign. These cyber criminals have adapted to recognize user behavior luring those in organizations that must con...Read more