Blog

Home / Blog

A live malware infection - a real life study (Part 1)

cyberattack  

We recently assisted a client that was aggressively hit with a phishing campaign. Following a couple of successful compromises they found themselves faced with an escalation with the malware attempting to impersonate staff, both emailing their customers and pivoting to attack the admin users in a secondary phishing attack. What made things a little more interesting than the usual kiddy attack was that the initial malware was not carrying a particularly nefarious payload, which meant that it escaped the usual malware detection that the client had deployed.

Insider Threats: A CISO Nightmare

featured  

With insider threats, your biggest assets become your biggest risks. One of today’s most damaging security threat comes from trusted insiders. Insider threats can come from anyone in your organisation, from those with the highest access to your company data to those who you think have no access at all. Your insiders are both employees and third parties. The risk is at all levels. Its no wonder that 25% of all security incidents involve company insiders.

Welcome

 

It’s strange to be writing a blog; as a Security focused company so much of what we do is highly confidential that one gets accustomed to not talking about what we do. Those that work with us, know what we do. Those that don’t, don’t need to. But now we’re developing some products, products for the commercial market. It’s an exciting time for us, opening up to a new market and bringing our somewhat unique view of the world to bear.

We won't share your details; subscribe if you like our content and want us to keep in touch.

Topics

ciso cyberattack insider-threat malware security

Featured

Insider Threats: A CISO Nightmare

With insider threats, your biggest assets become your biggest risks. One of today’s most damaging security threat comes from trusted insiders. Insider...