Real-Time Threat Detection Is the Key to Minimizing Fallout from Cyber Attacks
Real-time threat detection and rapid incident response is the key to preventing a simple exploit or compromise from becoming a massive data breach or crippling cybersecurity event.
Active Exploitation of Confluence Vulnerability CVE-2019-3396 Dropping Gandcrab Ransomware
Alert Logic security researchers share details of active exploit of Confluence vulnerability being used to spread Gandcrab ransomware.
Wipro Compromised and Clients Hit by Supply Chain Cyber Attack
The fact that IT consulting and outsourcing giant Wipro can be compromised by a phishing scam and used as part of a supply chain cyber attack illustrates the importance of visibility and 24×7 vigilance against threats for companies of all sizes.
The Importance of Channel Partners for Cybersecurity
Channel partners are essential for the cybersecurity market — giving vendors much broader reach than they can achieve on their own and providing a trusted relationship with the customer that helps them find the tools and services they need.
GoBrut Botnet ELF Variant and New C2 Discovered
GoBrut botnet ELF variant and new C2 discovered by Alert Logic’s Threat Intelligence researchers.
What Is the Dark Web?
A look at what the Dark Web is and how it is used by cybercriminals to buy and sell malicious exploits and compromised personal information.
Sifting Through the Hype of Artificial Intelligence & Machine Learning
The first in a three-part series looking beyond the hype of artificial intelligence and machine learning and examining the role machine learning plays in effective cybersecurity.
WordPress Giribaz File Manager Vulnerability Actively Exploited in the Wild
Security researchers from the Alert Logic Threat Intelligence team take a deeper dive into vulnerabilities in the Giribaz file manager plugin for WordPress, and share more details on active exploits in the wild targeting Giribaz.
Halting the Lockergoga Ransomware
Alert Logic researchers have discovered a flaw in the code of some Lockergoga samples that could be used to render the ransomware ineffective.
The 10 Biggest Data Breaches of 2018 … So Far
A look at the 10 biggest 2018 data breaches in the first half of the year, as well as a handful of “honorable mention” breaches that are worth noting as well.
Must-Know Phishing Statistics 2018
A look at phishing attacks and some of the key statistics that illustrate the trend of this growing threat in 2018.
A Clear Guide to Meltdown and Spectre Patches
A detailed review of the Meltdown and Spectre vulnerabilities and comprehensive information and links for recommended updates and patches.