This Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber threat to cryptocurrency...
Learning & Resource Center
Most Popular Posts
Malware Analysis – AppleJeus: JMT Trading
This Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber threat to cryptocurrency...
Vulnerabilities in Google Android OS Could Allow for RCE
OVERVIEW: Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to,...
CVE-2021-36934 – HiveNightmare
Summary The default configuration in Microsoft Windows 10 v1809 and newer includes an elevation of privilege vulnerability, because of overly permissive Access Control Lists (ACLs) in the Security Accounts Manager (SAM) database, as well as multiple other system...
CVE-2021-1675 and CVE-2021-34527 – PrintNightmare
Fortify 24x7 is tracking various public weaponized exploits for a remote code execution vulnerability affecting the Windows Print Spooler service (spoolsv.exe): CVE-2021-1675 and an out of band patch for CVE-2021-34527, also known as PrintNightmare. The vulnerability...
The Importance of SOC Analysts
In today's digital landscape, cyber threats are constantly evolving and becoming more sophisticated. As a result, organizations are increasingly relying on security operations center (SOC) analysts to protect their networks and data from cyber attacks. In this...
The Role of SOC Analysts
In today's digital landscape, cyber threats are becoming increasingly sophisticated and prevalent. As a result, organizations are investing in security operations centers (SOCs) to protect their networks and data. Within these SOCs, SOC analysts play a crucial role in...
Challenges Faced by Security Operations Teams
In today’s digital landscape, security operations teams are facing more challenges than ever before. With the rise of cyber threats and the increasing complexity of networks and systems, security operations teams are under immense pressure to protect their...
Enhancing Cybersecurity Through Strategic Operations
In today’s digital age, cybersecurity is a top priority for businesses of all sizes. With the rise of cyber attacks and data breaches, companies must take proactive measures to protect their sensitive information and maintain the trust of their customers. One crucial...
Advisories
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Research & Situational Awareness
BlackCat/ALPHV Ransomware IOCs
As of March 2022, BlackCat/ALPHV ransomware as a service (RaaS) had compromised at least 60 entities worldwide and is the first ransomware group to do so successfully using RUST, considered to be a more secure programming language that offers improved performance and...
IOCs Associated with Ranzy Locker Ransomware
The FBI first identified Ranzy Locker ransomware in late 2020 when the variant began to target victims in the United States. Unknown cyber criminals using Ranzy Locker ransomware had compromised more than 30 US businesses as of July 2021. The victims include the...
Company News
Fortify 24×7 Named To 2019 MSSP Alert Top 200 MSSP List
On September 19, 2019, MSSP Alert, published by After Nines Inc., has named Fortify 24x7 to the Top 200 MSSPs list for 2019. The list and research identify and honor the top 200 managed security services providers (MSSPs) specializing in comprehensive, outsourced...
Scott Schiefelbein, Managing Director and expert in law and tax joins the Enterprise Blockchain Club next Monday, January 9th at 6PM Pacific time. Olympic Mills, 7th floor. Zoom for remote attendees!
http://bit.ly/3QkfBZT

Happy Pi day! Swipe for two jokes since I irrationally couldn’t pick just one. #piday #pi #pi #irrationalnumbers #piday2020

It’s that time of year of again. Everyone is traveling, waits are longer and stress is higher. From Boarding passes to our entertainment, it is all stored on our devices. Having a charge can be crucial but is public USB charging still safe?
.
“Juice-Jacking” from USB charging stations are the latest warning threat. The LA district attorney advisory states, “…they may infect the phones and other electronic devices of unsuspecting users,” it reads. “The malware may lock the device or export data and passwords directly to the scammer.”
.
Here’s the thing though, no one really knows of any known cases on the books except maybe, possibly on the east coast. So why the advisory? The spokesperson said it was part of “an ongoing fraud education campaign.” They go on to say they have seen proof-of-concepts but nothing active. It’s not a crazy concept though. Plug your phone in, boom infection and all your information stolen. .
There will always be new threats so what do you do? Carry your own charging cords. Don’t borrow from a stranger. (hackers can rig a cord). Use an AC power outlet not a USB charging station or have a portable charger. Have 2 Factor Authentication. As we always advise, your devices should be protected with the right software. Reach out to the link our bio to help find the right one for you.
.
#cybersecuritymanaged #fortify24x7 #newtechnology #smarttechnology #techie #fasttechnology #technologynews #technologystats #juicejacking #hacking #holidaytravel #cybersecuritynews #cybersecurity #ai #artificialintelligence #BeCyberSmart #CyberAware

We’re listing some tech apps for your vet.
1. The World War Two Memorial App is on iTunes & Google Play. It helps you explore the World War II Memorial, sharing war stories as part of a virtual tour and offering a database to pull information up on those killed in combat.
2. The Honor Wall website by ancestry.com documents letters home, photos and awards of veterans.
3. Militarybenefits.info lists discounts, sales and everything free for vets and their families, ranging from free dinners to haircuts and oil changes. They`ve even posted a meal guide of deals for not only veterans, but also active duty and retired military.
4. ANC Explorer app is the official app for Arlington National Cemetery. Rich in information you can locate a gravesite, generate pictures of monuments or markers, and self guided tours, along with more.
#cybersecuritymanaged #fortify24x7 #newtechnology #smarttechnology #techie #fasttechnology #technologynews #techforyourvet #vet #happyveteransday #military #vettech #vettechlife #veteransupport
