SamSam Ransomware — What is this and How to defend?

Samsam Ransomware

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued an alert for SamSam ransomware to describe how hackers armed with SamSam targeted multiple industries. The U.S. Justice Department has charged two Iranian nationals as the masterminds behind the recent SamSam ransomware attacks. The cyber kidnappers behind SamSam ransomware attacks in Atlanta and Colorado earlier Read More »

Ascent InfoSec in the Top 100 MSSPs for 2018

Ascent InfoSec Top MSSP

Ascent InfoSec, the cybersecurity practice of Ascent Innovations LLC, is one of the Top 100 Managed Security Services Providers according to the research that evaluates MSSPs globally and 80 of these firms are based in United States. The Managed Security services span various technologies such as Firewalls, IDS/IPS, Web & Email gateways, Advanced Threat Defense, Read More »

Reduce Exposure Time: Managed Detection & Response

Q3Threats

Reducing the time an attacker spends in an environment is a key to mitigate the damage they can do. While most Managed Security Services Providers (MSSPs) are adept at responding to security alerts, Managed Detection & Response (MDR) services enhance the ability to track down attackers and eliminate them from an operating environment. The vital Read More »

FBI and DHS Issue Joanap and Brambul Malware Attack Warning

FBI and DHS Issue Joanap

According to an FBI and DHS warning, the Hidden Cobra hacker team in North Korea is using Joanap and Brambul malware to attack and access networks, primarily targeting media, aerospace, financial, and infrastructure companies. Joanap, a remote access tool, can secretly receive commands from Hidden Cobra. Brambul, a brute-force authentication worm, tries to access networks. Read More »

State Attackers Moving from Stealing Data to Social Meddling

State Attackers Moving from Stealing Data

The new cyber intelligence report expects that the monetary benefits will allure the use of crypto-mining malware and cryptocurrencies by cyber attackers this year. The cyber state attacker force is growing at an alarming rate. New bad actors. Few unexpected nation states are rising in the ranks of sponsored attackers, including spying on thousands of Read More »

Jay Leek on ProtectWise

Jay Leek on Protectwise

  Microsoft Partner for providing Cloud Solutions in Chicago, Illinois Top Managed Security Service Providers (MSSPs) in Chicago, Illinois Inc 5000 Fastest Growing Companies in US Best Managed Security Services Providers in Chicago, Illinois

MSSPs waste resources on False Positive alerts

MSSPs waste resources

One of the key findings from the survey of MSSP analysts conducted by Advanced Threat Analytics is that majority of the respondents report a false-positive security alert rate of more than 50%. Many analysts spend 5-6 hours a day investigating security alerts, with high false-positive rates. This frequently compromises security effectiveness and prevents security analysts from Read More »

MSSPs should provide Security Awareness Training

Security Awareness

MSSPs know that the protection provided by even their most powerful and comprehensive security solutions can be quickly undermined by careless or negligent behavior of their clients. Educating IT and end-users has always been a core component of an effective security strategy and with today’s sophisticated and rapidly morphing cyberattacks. The need for end-users to Read More »

Refuse Paying Ransom

Refuse paying Ransom

Mecklenburg County in North Carolina experienced additional cyberattacks after it refused to pay $23,000 in ransomware. However, county officials indicated that the latest cyberattacks were unsuccessful. Hackers launched the second set of cyberattacks against Mecklenburg County on Thursday, December 7, according to a prepared statement. County Manager sent an email to warn county employees about the cyberattacks Read More »

9 things you can do for your SMB to avoid a data breach

Data Breach Attack

You can never really tell if your business is going to be hacked. Hacking a large enterprise needs  specialized skills. Guess, who will the average skilled hackers go after. They are looking for weaknesses and will pounce when found. If you are not doing any of these nine things, you’re definitely are at higher risk of Read More »