Smart Building Technology Trends for 2018
In 2018, smart building technologies that increase energy efficiency will continue to be at the top of the list for building managers and tenants. These technologies can generate a solid ROI by...
View ArticleEnergy Industry Technology Trends for 2018
Unlike any other time, technology is having a tremendous impact on the energy industry. Some of the major trends are in areas we’re familiar with, yet the level of activity has increased dramatically....
View ArticleRecent WebBlocker Issue in Europe
WebBlocker Incident Report Users of the WebBlocker service in Europe experienced an outage late Thursday night that lasted into Friday morning, January 25 – 26, 2018. WatchGuard has worked closely with...
View ArticleThe 2018 Winter Olympics in PyeongChang, South Korea and Impact to the Cyber...
Major events like the Winter Olympics attract a lot of attention from fans all around the world. For three weeks fans will watch in person, on televisions, and online to follow the various competitive...
View ArticleEnd of Sale Announcement: WatchGuard 802.3af PoE Injector
WatchGuard will discontinue offering for sale (EOS) WatchGuard 802.3af PoE Injector for access points on April 1, 2018. At that time, hardware accessory SKU WG8568 will be discontinued and removed...
View ArticleWTB: Android Devices Targeted by New Monero-Mining Botnet
The intelligence in this week’s iteration discuss the following threats: Botnet, Cryptocurrency miner, Cyber espionage, Ransomware, Targeted attacks, and Vulnerabilities. The IOCs related to these...
View ArticleHow the No-Fly List Approach Can Be Used to Improve Cybersecurity
We’ve all heard of the No-Fly List. Managed by the FBI’s Terrorist Screening Center, the list bans people on it from boarding commercial aircraft within, into, or out of the United States. The No-Fly...
View ArticleHow Rogue Ales Makes a Great Beer from Wet Hops, Clean Water and Innovation
The challenge is local and global. The world has a major perishables problem. A full 30 percent of all perishable produce and products never make it all the way from the farm to the table. For Rogue...
View ArticleNorth Korean Cybersecurity Profile
North Korea, or more formally, the Democratic People’s Republic of North Korea (DPRK), is no stranger to international headlines. Most notably, it has captured attention in recent years for its nuclear...
View ArticleCisco Issues New Patch for Critical ASA Vulnerability
Cisco engineers discover that the flaw in Adaptive Security Appliance devices is worse than they initially understood. Source: Vulnerabilitys & Threats
View ArticleRetailer Resolutions for 2018
The numbers are in and the results are clear. Retailers enjoyed a very good holiday season. Not only was U.S. retail spending up 4.9 percent over the previous year, but a new tax law promises to leave...
View ArticleGetting into Tech…for the Non-Technical
My name is Teddy Powers. I have worked for Anomali (formerly ThreatStream) for almost the last three years and it’s been one of the best experiences of my life. But if you looked at my résumé or...
View ArticleWTB: Olympic Destroyer Takes Aim At Winter Olympics
The intelligence in this week’s iteration discuss the following threats: Compromised server, Cryptocurrency miner, Data theft, Malspam, Phishing, Targeted attacks, Underground markets, and...
View ArticleTaking the cyber No-Fly list to the skies
In our last post, we talked about how companies can use the concept of a No-Fly list to keep malicious actors out of their networks. So how does a cyber No-Fly list work in a real situation? We spoke...
View ArticleGenerating Your Own Threat Intelligence Feeds in ThreatStream
Getting threat intelligence into your existing security products – SIEMs, endpoints, network tools — can significantly enhance their effectiveness. Here at Anomali we understand the value of product...
View ArticleRewriting the Social Contract for Aging
Imagine you had a magic wand, and with a quick flip you cast America with an aging “social contract.” One in which few go to college and most would retire by age 65. Many of whom stay withdrawn and...
View ArticleVulnerabilities Broke Records Yet Again in 2017
Meanwhile, organizations still struggle to manage remediation. Source: Vulnerabilitys & Threats
View ArticleHeads Up! A Phishing Attack Early Warning System
You’re probably familiar with Anomali’s Threat Bulletins. If not, go and have a read of our most recent one covering “TODO.” Threat Bulletins provide information about an event to derive information...
View ArticleWTB: Jenkins Miner: One of the Biggest Mining Operations Ever Discovered
The intelligence in this week’s iteration discuss the following threats: AWS Leaks, Breaches, Cryptominers, Exit Scams, Google AdWords, Jenkins server vulnerabilities, Lazarus Group, Rapid Ransomware...
View ArticleGateway Antivirus Issue: Root Cause Analysis
Summary: WatchGuard had an issue with Gateway Antivirus (GAV) signatures on February 7th , 2018 that affected M300, M200, and T35 appliances running firmware version 12.0 and later. An error in the...
View Article