Tag: lateral movement

  • NCSC gives important advice on lateral movement

    Though not even a year and a half old, the UK’s National Cyber Security Centre (NCSC) has already managed to make a name for itself through its practical advice and guidance on many security topics. Earlier this month, the Centre published guidance on lateral movement : the techniques used by an attacker to move through…

  • NCSC gives important advice on lateral movement

    Though not even a year and a half old, the UK’s National Cyber Security Centre (NCSC) has already managed to make a name for itself through its practical advice and guidance on many security topics. Earlier this month, the Centre published guidance on lateral movement : the techniques used by an attacker to move through…

  • Olympic Games target of malware, again

    The organisers of the Pyeongchang Winter Olympics have confirmed a malware attack against their computer systems. Though the attack affected the Wi-Fi during Friday’s opening ceremony and knocked the event’s website offline for a few hours, no permanent damage appears to have been done. Cisco Talos researchers Warren Mercer and Paul Rascagneres have performed a…

  • Olympic Games target of malware, again

    The organisers of the Pyeongchang Winter Olympics have confirmed a malware attack against their computer systems. Though the attack affected the Wi-Fi during Friday’s opening ceremony and knocked the event’s website offline for a few hours, no permanent damage appears to have been done. Cisco Talos researchers Warren Mercer and Paul Rascagneres have performed a…

  • Worms wiggling inside your networks are a lot harder to stop

    Damaging though they were, the recent WannaCry and (Not)Petya outbreaks taught security practitioners many valuable lessons. Unfortunately, they taught important lessons to malware authors too. What contributed to the damage in both cases was the malware’s ability to spread internally using a number of methods, most prominently (though in (Not)Petya’s case not exclusively), a vulnerability…

  • Worms wiggling inside your networks are a lot harder to stop

    Damaging though they were, the recent WannaCry and (Not)Petya outbreaks taught security practitioners many valuable lessons. Unfortunately, they taught important lessons to malware authors too. What contributed to the damage in both cases was the malware’s ability to spread internally using a number of methods, most prominently (though in (Not)Petya’s case not exclusively), a vulnerability…

  • Paper: Spreading techniques used by malware

    Malware infections usually start with a user opening an attachment, visiting a link, or simply accessing an infected site with a vulnerable browser. But once malware has infected an endpoint, it often looks for other devices in order to spread further, or at least to include the files on those devices in its malicious encryption…

  • Paper: Spreading techniques used by malware

    Malware infections usually start with a user opening an attachment, visiting a link, or simply accessing an infected site with a vulnerable browser. But once malware has infected an endpoint, it often looks for other devices in order to spread further, or at least to include the files on those devices in its malicious encryption…