Sage Advice - Cybersecurity Blog

Why Email is a Cybersecurity Risk and How to Protect Yourself

Many successful cyberattacks start with someone clicking a link in an email. According to Verizon’s latest Data Breach Investigations Report, phishing and pretexting represented 93% of all social breaches they studied. And email was the most common attack vector (96%). But it’s impossible to imagine doing your job without email, so what can you do to mitigate some of the risk?   

Read More

Topics: Risk Management, Malware

Cybercrime-as-a-Service... Can You Spot the Cybercriminal?

Though it’s a natural evolution, the very existence of cybercrime-as-a-service (CaaS) shocks people. Never mind the annual global costs attributable to CaaS, or how much it hampers innovation. In his keynote at the 2017 CyberCrime Symposium, McAfee Chief Scientist Raj Samani made sure attendees understood the CaaS threat — calling his content the “most depressing 45 minutes” they’d ever get at a security event — by mapping its rise and rapid expansion.

Read More

Topics: CyberCrime Symposium, Malware, Cyber Crime

What You Need to Know about Fileless Malware

Cybercriminals have a variety of tools and techniques in their bag of tricks. In order to go about their business undetected though, their tools are constantly changing. It seems once the good guys figure out how to defend against one type of attack, they’ve already moved on to the next type. This year, fileless malware (also called non-malware) is making headlines as one of the latest up-and-coming infection techniques.

Read More

Topics: Threat Detection Tips, Cyber Defense, Malware

What You Don’t Know: Cyber Defense Against Unknown Threats

Even with all the traditional cybersecurity defenses, breaches still occur.  “So, why haven’t these traditional security products adequately protected you?” asked Jack Walsh, New Initiatives and Mobility Programs Manager at ICSA Labs, during his talk at the 2016 CyberCrime Symposium.  According to Walsh, it’s due, in part, to the fact that while they do an okay job against known threats, they “don’t do a good job at all against unknown and new threats.”

Read More

Topics: CyberCrime Symposium, Malware, Cyber Defense

Behind the Scenes: Demystifying Malware

The frequency and size of malware attacks and the havoc they wreak are generating a continuous stream of media coverage, attracting eyeballs with often shocking details of breach size. What’s often missing in news stories on data breaches are critical behind-the-scenes “players” – the employee roles and IT systems targeted, the technology infrastructure that supports an attack, the malware tools, and the attackers that create and use the infrastructure.

Read More

Topics: CyberCrime Symposium, Malware, Cyber Defense

Don’t Blame Bitcoin for Ransomware

Though it’s been around in various incarnations for a couple of decades, ransomware is one of the hottest topics in the world of cybersecurity, and for good reason. It’s malware on the rise, thanks to its role in a growing number of successful cyber-attacks and the high ROI it delivers.

Read More

Topics: Malware, CyberCrime Symposium, Ransomware

Mobile Malware’s Getting Smarter

Despite their immense popularity, ubiquity, and ability to find their way into just about any IT conversation and industry content, mobile devices haven’t attracted much interest from the attack side. Though device infections did reach a new high in April 2016, they comprised just 1.06% of total malware infections, explained Kevin McNamee, director of Nokia’s Threat Intelligence Lab, during his presentation at the 2016 CyberCrime Symposium.

Read More

Topics: Mobile Security, CyberCrime Symposium, Malware

Exploit Kit 101 - What You Need to Know

Back in the day, hackers needed to write their own code to exploit systems.  But times have changed!  Today’s hackers can license software, known as exploit kits, from other hackers – sometimes for less than a night on the town – that make attacking your systems quicker and easier than ever before. 

Read More

Topics: Malware, Ransomware, Cyber Defense

The Current State of Ransomware

Ransomware cyberattacks are on the rise. If your computer is infected with ransomware, a type of malware (malicious software), you are not able to access data until a ransom is paid to the attacker. After the ransom is paid the data will usually be released.

Ransomware is opportunistic in nature; computers are typically infected by a user clicking on a malicious email attachment or visiting an infected website.

Read More

Topics: Malware, Ransomware, Cyber Crime

Seven Types of Malware You Should Be Aware Of

Malware, short for “malicious software,” is software (or script or code) designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems and mobile devices. 

Read More

Topics: Malware, Cyber Crime, Threat Hunting