Recently, one of my favorite YouTube channels, Dave Jones’ EEVblog, came under attack after having published a series of videos debunking a product claiming to vastly extend the life of alkaline batteries. But just how do you “attack” a YouTube channel? One does not simply DDoS Google in order to silence a YouTube channel; no […]
Few security researchers possess the skills to detect elusive threat actors and gather the evidence of Advanced Persistent Threat (APT) groups lurking beneath the surface of legitimate-appearing network traffic. Dell SecureWorks Counter Threat Unit™ (CTU) researchers gain insights about threats such as Threat Group-3390 (TG-3390) from monitoring clients’ environments, including traffic and endpoints, and conducting intrusion analysis during incident response engagements.
Dell SecureWorks Counter Threat Unit™ (CTU) researchers conducted a longitudinal analysis of the malware family called Sakula (also known as Sakurel and VIPER), which targeted organizations in multiple verticals. Since at least November 2012, the malware has given threat actors remote access to compromised systems. In 2014, Sakula became publicly known when it was spotted […]
Black Hat USA 2015, one of the world’s most technical and relevant global information security events, is approaching, and Dell SecureWorks will be there to offer insights about the current cybersecurity landscape and how organizations can arm themselves against evolving threats.
Arming your employees with tools to help prevent attacks is a start, but it has to be done effectively and it isn’t enough to secure your information. Technological safeguards work hand-in-hand with awareness training to support a strong security posture.
It seems every day we hear about another security breach, prompting us to reexamine how secure our data is. As the threat landscape evolves, vigilance to protect sensitive personal and professional information becomes more and more important. Here’s what you can do to keep on top of securing your identity.
Companies need to efficiently use resources and sometimes that requires reallocating funds or spending cuts. With today’s landscape, organizations can no longer afford to sacrifice information security for the sake of other parts of the business.
Small businesses cannot operate under the assumption they fly under the radar when it comes to malicious hackers. On the contrary, threat actors know growing businesses have security vulnerabilities and often target them specifically to steal their data or use them to gain access to bigger organizations.
Dell SecureWorks Counter Threat Unit researchers have found that threat groups victimizing a particular vertical today may infiltrate new verticals tomorrow. Organizations should never dismiss the threat from groups that seem to only target other industries and should have thorough plans and mitigation strategies in place.
Dell SecureWorks Counter Threat Unit™ (CTU) researchers analyzed a stealthy malware family named Stegoloader that has been active since at least 2013 and yet is relatively unknown. It has been distributed through software piracy websites, bundled with software license key generators.