Blog

Home / Blog

A live malware infection - a real life study (Part 1)

cybersecurity malware security  

We recently assisted a client that was aggressively hit with a phishing campaign. Following a couple of successful compromises they found themselves faced with an escalation with the malware attempting to impersonate staff, both emailing their customers and pivoting to attack the admin users in a secondary phishing attack. What made things a little more interesting than the usual kiddy attack was that the initial malware was not carrying a particularly nefarious payload, which meant that it escaped the usual malware detection that the client had deployed.

Welcome

 

It’s strange to be writing a blog; as a Security focused company so much of what we do is highly confidential that one gets accustomed to not talking about what we do. Those that work with us, know what we do. Those that don’t, don’t need to. But now we’re developing some products, products for the commercial market. It’s an exciting time for us, opening up to a new market and bringing our somewhat unique view of the world to bear.

Register if you want to learn about cybersecurity and advanced tech.

You can unsubscribe with one click, and we'll never share your email address.

Topics

ai atlassian best-practices ciso climate-change cloud covid19 crime culture customer-success cybersecurity data-protection development dlp employees gdpr insider-threat malware office365 remote-working security semafore slack technology

Featured

Technology Stack for Customer Success Teams

As competition continues to get tougher, businesses look for new ways to stay ahead of the game. Thanks to technology, businesses of any size have acc...

Can AI Help Reduce the Carbon Footprint of the Retail Industry?

The COVID-19 pandemic has affected the lives of many people on all fronts. Besides making the importance of health and immunity more evident to all, i...