Results for cyber threat alliance

Industry Trends

Are You Ready for the Evolution of Ransomware?

A recent Cyber Threat Alliance blog by Michael Daniel discussed the evolution of ransomware and the IoT. Read this post to learn more.

By Jeannette JarvisJanuary 15, 2018

Business and Technology

Threat Information Sharing Can Change the Security Landscape

To further expand and solidify the power of threat information and intelligence sharing, specialists, researchers, and consumers of threat intelligence are gathering at the annual CyberNext DC on October 25, 2017. The Cyber Threat Alliance, the Coalition for Cybersecurity Policy and Law, and the National Security Institute are this year’s conference sponsors. Keynotes will be delivered by Ron Johnson, US Senator from Wisconsin and Senate Homeland Security chair, and Michael Daniel, President & CEO of the Cyber Threat Alliance.

By Derek MankyOctober 25, 2017

Partners | Threat Research

Threat Insights: The Aftermath of the WannaCry Attack

A perspective blog with Derek Manky, Global Security Strategist, Fortinet. We asked Derek to put WannaCry into context. Is this just the eye of the storm?

By Bill McGeeMay 18, 2017

Industry Trends

AVAR 2015 Wraps Up – Vietnam Edition

For the 18th edition of the Association of Antivirus Asia Researchers conference, we flew to Da Nang in the beautiful country of Vietnam. Every major security vendor was present, not only those from Asia. After two full days of presentations, we would like to call out the briefings we enjoyed the most. I would say as usual that Mikko Hypponen from F-Secure gave a good talk about Securing Our Future, reaffirming that our job is to protect users globally and that the key for that is to work altogether. That means not...

By David MaciejakDecember 09, 2015

Threat Research

Keeping Pace with Cryptowall

Overview Cryptowall is a popular ransomware which targets computers running Microsoft Windows, encrypts files, and extorts money to decrypt user files. With its predecessor’s first appearance way back September 2013, cryptowall has become a financial success to its authors. Following this success, the authors have now released what is believed to be the 4th generation of cryptowall with new alterations techniques. Ransom Note The most obvious change from the previous cryptowall is the dropped files and message instructions after the...

By Rommel Abraham D. JovenNovember 13, 2015

Industry Trends

National Cyber Security Awareness Month Ends With Zero Days, Ransomware, and a Bit of Hope

It’s Friday night, tomorrow is Halloween, Daylight Saving Time ends this weekend, and it’s the end of National Cyber Security Awareness Month. This week has seen big breaches, teenagers arrested for hacking TalkTalk, escalating international cyber tensions, and what appears to be even more new vulnerabilities and zero-days announced than usual.    However, it isn’t all doom and gloom, shorter colder days, reduxes of Cold War rhetoric with some cyber buzzwords woven in, and kids running afoul of the law this week....

By Chris DawsonOctober 30, 2015

Industry Trends

Collaborating on Threat Research: What We Learned from the Cyber Threat Alliance CryptoWall v3 Research Project

There is a greater mission on the part of every security vendor to make the world safer and more secure for people to interact, do business, and communicate ideas.    Today is a big day for us. Today the Cyber Threat Alliance, founded May 30, 2014, published its first collaborative research project -- an analysis of the CryptoWall version 3 campaign (learn more about this project here). The CryptoWall research report represents the successful culmination of a big project, a 90-day proof of concept effort among the founding members...

By Derek MankyOctober 29, 2015

Industry Trends

Threat Intelligence Sharing At Work: Cyber Threat Alliance Tracks CryptoWall Version 3

CryptoWall and its variants are among the best-known types of ransomware, malware that encrypts files on end user hard drives and then prompts for payment of a ransom to decrypt the files. In many cases, if users don’t have recent backups, their only option to recover these files is to pay the ransom.    CryptoWall Version 3 (CW3) is the most recent major variant that uses sophisticated backend technical and financial infrastructure to extort payments from users, all while employing a variety of measures to slow detection and...

By Derek MankyOctober 28, 2015