-
Data Security
Jun 07, 2018
What Does it Take to Be an Ethical Hacker?
What do you think of when you hear the term “hacker”?
Rob Sobers
3 min read
-
Data Security
Jun 04, 2018
The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware
The LoL approach to hacking is a lot like the “travel light” philosophy for tourists. Don’t bring anything to your destination that you can’t find or inexpensively purchase once you’re there. The idea is to live like a native. So hackers don’t have to pack any extra software in their payload baggage to transfer external files: it’s already on the victim’s computer with regsrv32.
Michael Buckbee
5 min read
-
Data Security
Jun 01, 2018
The State of CryptoWall in 2018
CryptoWall and its variants are still favorite toys of the cybercriminals that want your Bitcoin. In fact, according to the 2018 Verizon Data Breach Investigation Report, ransomware incidents now make up about 40% of all reported malware incidents! Some reports say CryptoWall 3.0 has caused over 325 million dollars in damages since it first came on the scene.
Michael Buckbee
5 min read
-
Data Security
May 30, 2018
Australian Prudential Regulation Authority CPS 234
The Australian Prudential Regulation Authority (APRA) regulates Australia’s financial services industry, including banks, insurance companies, and investments firms. In December 2018, they published the final version of its security framework, known as CPS 234 Information Security.
Michael Buckbee
1 min read
-
Data Security
May 25, 2018
What's The Difference Between a Proxy and a VPN?
The Internet can be a scary place: we’re under near constant attack from ransomware and botnets – on work computers, personal devices, even smart home devices like thermostats and baby monitors.
Michael Buckbee
4 min read
-
Data Security
May 24, 2018
The Malware Hiding in Your Windows System32 Folder: Intro to Regsvr32
This article is part of the series "Living off the Land With Microsoft". Check out the rest: Master Fileless Malware Penetration Testing! The Malware Hiding in Your Windows System32 Folder: Intro to Regsvr32 The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32 The Malware Hiding in Your Windows System32 Folder: More Rundll32 and LoL Security Defense Tips
Michael Buckbee
5 min read
-
Data Security
May 21, 2018
What is a Proxy Server and How Does it Work?
The actual nuts and bolts of how the internet works is not something a people often stop to consider. The problem with that is the inherent danger of data security breaches and identity theft that come along with the cute dog pictures, 24 hour news updates, and great deals online.
Michael Buckbee
7 min read
-
Data Security
May 18, 2018
What is Spear Phishing?
According to the 2018 Verizon Data Breach Report, phishing and pretexting are the two favorite tactics employed in social engineering attacks, used in 98% and 93% of data breaches respectively. And last year, the IRS noted a 400% surge in spear phishing against CEOs.
Michael Buckbee
3 min read
-
Data Security
May 10, 2018
Australian Notifiable Data Breach Scheme, Explained
A third time is a charm, in life and in data breach notifications laws. On February 13, 2017, the Australian government, in its third attempt, passed the Notifiable Data Breaches scheme, which finally came into effect on February 22nd of this year.
Michael Buckbee
4 min read
-
Data Security
May 08, 2018
The Anatomy of a Phishing Email
Have you been hooked by a phishing email?
Rob Sobers
3 min read
-
Privacy & Compliance
May 02, 2018
Canada’s PIPEDA Breach Notification Regulations Are Finalized!
While the US — post-Target, post-Sony, post-OPM, post-Equifax — still doesn’t have a national data security law, things are different north of the border. Canada, like the rest of the word, has a broad consumer data security and privacy law, which is known as the Personal Information Protection and Electronic Documents Act (PIPEDA).
Michael Buckbee
2 min read
-
Active Directory
Apr 23, 2018
5 FSMO Roles in Active Directory
Active Directory (AD) has been the de facto standard for enterprise domain authentication services ever since it first appeared in late 1999 (in Windows Server 2000). There have been several enhancements and updates since then to make it the stable and secure authentication system in use today.
Michael Buckbee
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital