Double Agent, a Dangerous New Zero-Day Threat, Caught by SparkCognition’s DeepArmor

| March 24, 2017

article image
If you were reading the cybersecurity headlines yesterday morning, you know that the big news of the day was about Double Agent, a fearsome new zero-day threat that turns antivirus systems into malware, cannot be patched, and has few to no limitations in what in can do once it infects a system.

Spotlight

ITAC SA

ITAC is a 100% Colombian company, Manufacturer of Security Solutions and SOA of the highest quality; Provider of IT Consulting Services and recognized Secure Software Factory, valued at CMMI Level 3. Has experience in various sectors of the economy, with success stories in more than 8 countries throughout the Americas, working with some Of the most important companies in the region. ITAC is recognized as an expert in specialized consulting to prevent security, architecture and application performance problems through quality assurance throughout the Software Development Lifecycle, development of solutions for secure information exchange and Factory of software. It has a committed and constantly updated work team in the latest technological trends, professional experts with exceptional skills and ingenuity, supported by a standardized, automated and valued development process at CMMI level 3, for the creation of highly effective solutions. They have 75 industry certifications on Java te

OTHER ARTICLES

Cybersecurity in the Time of COVID-19

Article | March 30, 2020

A decade ago, Stuxnet pulled me into the accelerating, widening gyre of cybersecurity. I began to devote less time to global health, a topic on which I spent the previous decade developing familiarity and producing a large carbon footprint. I would frown when cybersecurity analysis borrowed concepts from public health, thinking, “if they only knew the life-and-death troubles that health practitioners face implementing those concepts.” Cybersecurity and public health are different challenges. Yet, the COVID-19 pandemic has cybersecurity relevance because it has generated sobering reminders of long-standing problems, unresolved controversies, and unheeded warnings that continue to characterize U.S. cybersecurity.

Read More

What is Ransomware and What You Need to Know to Stay Safe?

Article | March 5, 2020

While there may be more than 1 billion pieces of malware prowling the internet for a chance to infect victims, one particular piece of nastiness has been inflicting financial losses and security headaches for years.Known as ransomware, its sole purpose is to block access to computer systems or files until the victim pays a ransom. These ransom demands fluctuate wildly, from the equivalent of a couple of hundred dollars to several hundred thousand. In the simplest terms, ransomware is a piece of malicious software that prevents users from using their devices or accessing their personal or important files, unless a sum of money is paid. Payment is usually demanded in cryptocurrency, such as Monero or Bitcoin. Victims are told to purchase these digital assets and then transfer them to the attackers.

Read More

Coronavirus and the Cybersecurity Threat Landscape

Article | March 4, 2020

Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will hit every organization, no matter how resilient they thought they were. No single event to date has changed the tech threat landscape more than the consequences and impacts developing around the Coronavirus (aka SARS-CoV-2 and the disease CoViD-19). Then there are the business consequences, such as the sudden changes in consumer patterns and steep loss of income. The coronavirus is unmistakably a black swan event. It falls outside of the outliers. It creates a situation that many security professionals are familiar with: The Medusa Effect.

Read More

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | May 13, 2021

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Spotlight

ITAC SA

ITAC is a 100% Colombian company, Manufacturer of Security Solutions and SOA of the highest quality; Provider of IT Consulting Services and recognized Secure Software Factory, valued at CMMI Level 3. Has experience in various sectors of the economy, with success stories in more than 8 countries throughout the Americas, working with some Of the most important companies in the region. ITAC is recognized as an expert in specialized consulting to prevent security, architecture and application performance problems through quality assurance throughout the Software Development Lifecycle, development of solutions for secure information exchange and Factory of software. It has a committed and constantly updated work team in the latest technological trends, professional experts with exceptional skills and ingenuity, supported by a standardized, automated and valued development process at CMMI level 3, for the creation of highly effective solutions. They have 75 industry certifications on Java te

Events