Author: Bert Rankin

From Bad Rabbit to NotPetya, bad actors are constantly evolving their malware attack vectors–the methods they use to distribute sophisticated malware attacks. This ever-growing network threat landscape requires organizations to keep abreast of changes in the way in which malware is delivered. Keeping Pace with New...

Over the last few years, we’ve seen a number of families of malware written specifically for the Mac OS X operating system. There was Flashback, and more recently the KeRanger ransomware. We’ve also seen more targeted attacks where Mac OS X malware was written to...

A “watering hole attack” is one of many techniques used by cybercriminals to breach an organization’s online information system. Network security administrators should understand how watering hole attacks work, and how to guard against them. Watering hole attacks are neither new or common, but they continually...

One of the applications of advanced threat analytics is protecting people and devices from malicious advertisements. It has become increasingly common for websites, even well-known and trusted ones, to become victims of malicious advertisements or malvertising. When a user visits an infected site, the malicious advertisement...

During the last few months, we’ve been watching an interesting twist in malware analysis. Cybercriminals recently developed a technique where, in some cases, malware can infect a device when the victim simply hovers their mouse over a malicious link. The dangers of clicking on a link...

Malicious email remains one of the most significant and ongoing computer security threats that we face. Cybercriminals use a variety of email-based attacks to deliver malware, lure victims to malicious websites, and steal logon credentials, and organizations everywhere need to understand these threats and how...

Preventing Business Email Compromise is critical for organizations everywhere. Here’s a quick overview of this malicious email-based threat and how to stop it. Sometimes referred to as “whaling” since it specifically targets or impersonates an organization’s biggest fish, in a BEC campaign, the attacker sends an...