CyberSecurity

Demonstrating the Importance of Intelligence for National Security at ISDEF 2019

by Colleen Gustitus

posted at May 28, 2019

Though the meaning of “security” has evolved significantly over the last several years, one fact remains certain: protecting people, property, and assets has never been more important than in today’s rapidly expanding risk landscape. In addition, while this applies to mission-critical organizations of all shapes and sizes, there is one market that must contend with

Breaking Down Builder-encrypted RAT

by Nadav Lorber

posted at November 7, 2018

The emerging trend of Fully Undetectable (FUD) malware builders is not new to our research team. However, in light of the wide variety of techniques that the malware authors keep developing, it’s obvious that we will always encounter malicious code execution tricks that successfully bypass traditional anti-malware solutions. This blog post is actually a case

Threat Hunting with TPS to Reveal Undetected Malicious Activities

by Nadav Lorber

posted at October 25, 2018

One of the common concepts applied in threat hunting, is to define a hypothesis that will yield indicators/TTPs to follow, in order to discover malicious behavior that went under the radar. When using Verint’s Threat Protection System (TPS) for example, we can utilize predefined queries that aim to discover malicious indicators within the events’ raw

PyLocky Ransomware Source Code Leaked Online

by Verint Cyber Threat Intelligence Research Team

posted at October 9, 2018

Threat Summary PyLocky represents a new ransomware strain that was detected in the wild in late July 2018, and whose volume of infections increased throughout the month of August. The malware is usually distributed through malspam emails claiming to link to a fake payment invoice, and it features advanced anti-detection and anti-sandbox capabilities. Notably, infection