Cybercrime

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation

GOALS The goals of this paper are to demonstrate how dangerous ransomware has become, describe the latest techniques used by ransomware gangs, and suggest what your organization can do to reduce exposure to, and damage from, ransomware attacks. Three ransomware attack vectors are addressed in this order: remote access, email, and supply chain. RANSOMWARE — […]

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation Read More »

Global Incident Response Threat Report

Manipulating reality: The rise of business communication compromise, time-stamp manipulation, and cloud-jacking empowers adversaries to execute integrity attacks Key findings Attacks are becoming more destructive and targeted through advanced techniques. Respondents indicate that targeted victims now experience integrity and destructive attacks more than 50 percent of the time. Cybercriminals are achieving this through emerging techniques,

Global Incident Response Threat Report Read More »

A Fresh Look at Trickbot’s Ever-Improving VNC Module

The journey of Trickbot starts almost half a decade ago, when it appeared in the form of a banker and credential-stealing application. Drawing inspiration from Dyre (or Dyreza), Trickbot consists of an ecosystem of plugin modulesand helper components. As of late, the Trickbot group, which has managed to infect millions of computers worldwide, has played

A Fresh Look at Trickbot’s Ever-Improving VNC Module Read More »

Alexis Dorais-Joncas

Security Intelligence Team Lead at ESET Alexis Dorais-Joncas started his career in cybersecurity in 2010, when he was hired by ESET as a malware researcher. In 2015, Alexis was appointed head of ESET’s R&D branch office located in downtown Montreal, where he and his team focus on cutting edge malware research, network security, and targeted

Alexis Dorais-Joncas Read More »

The State of Secure Identity

Traditionally, the information security domain has examined identity through the lens of the corporate enterprise. In this context, user lifecycle management is about onboarding and managing the identity of employees who need access to corporate systems. For consumer-facing businesses, customer identity and access management (CIAM) is just as critical. And, this is why I’m so

The State of Secure Identity Read More »

Modern Bank Heists 4.0

This marks the fourth edition of the Modern Bank Heists report, which annually takes the pulse of some of the financial industry’s top CISOs and security leaders. Thank you, again, for reading along, and thank you to the 126 security leaders who participated in this year’s study. 48 percent of the financial institutions (FIs) are

Modern Bank Heists 4.0 Read More »