Tag: ransomware

DeepMath – Deep Learning Using a Deep Neural Network

The DeepMath Team has been busy developing a new deep neural network and optimizing its training. The deep neural network is quite different from the previous deep learning based networks we have used so far. The algorithm used in the new deep neural network is called a multilayer perceptron (MLP), a technique used in various…

Read More

The Importance of User Experience and Software Engineering in a Buyer’s Selection Process

This article highlights the importance of focus on user experience and software engineering as an important part of a buyer’s overall selection process. A good experience gives the buyer the confidence to continue on with the purchase and ultimately increase the value of their investment. At the same time, it’s important to be mindful of…

Read More

The Best Cyber Security Insurance

As security professionals, we are all familiar with the problem that malware has become a much more critical issue over the past few months while our business growth rate has slowed dramatically. This problem has been compounded by the fact that there is a very high rate of the attacks happening in our networks. There…

Read More

Is the Strategic Framework a Good Idea?

In the United States, the media has for years led with the claim that the Strategic Framework (SF) was a flawed product. This is a very serious understatement. On 9 July 2007, the US Congress authorized the Office of Management and Budget to study whether the SF was an effective instrument for managing and controlling…

Read More

SoftLayer’s Most Recent Product Acquisition – Palantir

Predictably, SoftLayer’s most recent product acquisition has been Palantir – a private firm that’s been trying to become a business-to-business provider of data processing and analytic services. So Palantir is in a position to provide the kind of deep technology insight that softlayer has to offer. Unfortunately, as we’re about to see, Palantir is not…

Read More

Connecting RaaS, REvil, Kaseya and Your Security Posture

It’s a quote that seems to be increasingly attributed to hackers when they’re found to be doing what a lot of us are doing at times – just letting go of security posture. And, although the post is titled “Connecting RaaS, REvil, Kaseya and Your Security Posture,” the author seems to be aware of those…

Read More

The Rise of the Ransomware

White cryptons are often overlooked in the research on malware infections, and the rise of the ransomware is a case in point. In the beginning of March, a virus that infected a user’s computer in South Carolina was delivered by an unknown white crypton, called “The Pawn of Death,” which has been described in a…

Read More

Update: Microsoft Has Fixed the Printer Nightmare Vulnerability

This article presents the first empirical examination of the relationship between the use of malware and the threat landscape: the ability to pay for remote access. The authors demonstrate that payment for the privilege of remote access is not sufficient to enable the malware community to continue to operate. In contrast, the authors argue, malware…

Read More

The DarkSides Malicious Software (DSM) Ecosystem

Description: The DarkSides Malicious Software (DSM) ecosystem is a large black market that is filled with malicious software. DSM malware is distributed in malware-infected and malware-free software (MIS and MFx, respectively), which can be used to infect other malware-infected malware. What is DarkSides? DarkSides is a cyber espionage operation that sells malware for high monetary…

Read More

Malwarebytes Anti-Ransomware

How can you be sure to get the right ransomware? Cybercriminals typically create their ransomware with a computer infected with ransomware as their entry point. Once the ransomware infects a system, the computer is then infected with malware called malwarebytes. Many people have the misconception that ransomware is “bad”. The reality is that ransomware is…

Read More