• Home
  • Demo
  • Contact
 
  • Home
  • Our Story
    • Overview
    • Testimonials
    • Industry Recognition
    • Leadership
    • Board of Advisors
  • Our Products
    • Threat Landscape
    • Javelin AD | Protect
    • How It Works
    • IR, Hunting, Breach Containment
    • Solution Architecture
    • Features & Benefits
  • AD Assessment
  • Blog
  • News
  • Press Releases
  • Eyal Neemany Mar 09, 2017

    SAMAS RansomWorm: The Next-Gen Ransomware That Stole $450,000

    By Eyal Neemany | March 9, 2017

    How is Samas RansomWorm different from normal ransomware?

    Whereas traditional ransomware only encrypts the machine the attacker is controlling, RansomWorm spreads inside throughout the entire network to encrypt every server and computer—and the backups.

     

     

     

    Read More..

    [gs_lp_like_post] 0 responses
  • Almog Ohayon Mar 14, 2017

    CIA Leak - The Enterprise Perspective

    By Almog Ohayon | March 14, 2017

    Edward Snowden was right about CIA hacking activities: they are going to lose control of their “weaponized gun” — and it’s going to be ugly.

    On March 7th, 8,761 documents and files were leaked from the CIA to Wikileaks introducing the scope and direction of the CIA’s global covert hacking program, its malware arsenal, and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products: Apple iPhone, Google Android, Microsoft Windows, and even Samsung smart TVs, which are turned into covert microphones.

    Read More..

    [gs_lp_like_post] 0 responses
  • Almog Ohayon Apr 05, 2017

    Operation Cloud Hopper - #APT10

    By Almog Ohayon | April 5, 2017

     

    APT10—allegedly a Chinese threat actor—has come up in the news recently, this time running a campaign known as Operation “Cloud Hopper”.

    Chinese actors are the main suspect based on malware compilation time and interactive hacking activities, but there’s a chance that this is a deception attempt to manipulate the forensics evidence.

     

     

    Read More..

    [gs_lp_like_post] 0 responses
  • Almog Ohayon Apr 27, 2017

    ShadowBrokers, Doublepulsar and everything you need to know about the latest NSA leak

    By Almog Ohayon | April 27, 2017

    The main goal for nation-state actors working for intelligence purposes is to establish a consistent and reliable digital presence. Whether or not they have an active operation, they need to be ready to launch a campaign at any time. To do so, they need to be deployed all the time.
     

     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    Read More..

    [gs_lp_like_post] 0 responses

    Tags

    Active Directory apt10 cia DFIR espionage Forensics Incident Response IR Mimikatz nsa Powershell ransomware Samas

    Categories

  • Blog
  • Press Releases
“LETS PLAN AN APT”
GET THE A3 POSTER
THE TRUTH BEHIND APT
Get the White Paper now
DOWNLOAD
AD ASSESSMENT
Exposed? At risk? Check if an attack left backdoors or hooks behind.
GET AD ASSESSMENT
Story
  • Testimonials
  • Industry Recognition
  • Leadership
  • Board of Advisors
  • Contact Us
  • Blog
Products
  • Threat Landscape
  • Javelin AD | Protect
  • How It Works
  • IR, Hunting, Breach Containment
  • Solution Architecture
  • Features & Benefits
  • Javelin
  • Privacy
  • Terms of Use