Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Resilient Partners with FinalCode DRM to Protect Data Everywhere

The digital right management sector is an excellent fit for Resilient’s adaptive access management capabilities, and we are very excited to announce our partnership with FinalCode. The combined power of our two technologies will help enterprises and government agencies securely share files and collaborate across boundaries, by ensuring that the right users

Read More >

Locky Ransomware Now Embedded in Javascript

A new wave of Locky malware emails have been making the rounds since yesterday — July 20, 2016 — with a critical new development, whereby the Windows executable is now embedded in JavaScript. Essentially, the attached JavaScript file has evolved from being a downloader component into becoming the actual ransomware.

Read More >

Locky Distributors Switch to Word Macro and then WSF Files

Locky Ransomware continues to be distributed in large numbers, however, the email attachments have been changed, probably due to greater blocking of the JavaScript files that have been favored until now. The Locky attack begins with an email attachment that downloads the actual Locky ransomware. Last week, the Downloader component

Read More >

Locky Developers Continue to Enhance Ransomware Delivery and Operation

In the past week we have seen a resurgence of Locky malware emails. Some examples of the attachment filenames (there are many variations): DETAILS_%username%_291866.ZIP->extracted file: unpaid-166.js  %username%_ADDITION_744341.ZIP-> extracted file:addition-0106.js %username%_INVOICE_337060.ZIP-> extracted file:unpaid-643.js SERVICES_%username%_793350.ZIP-> extracted file:addition-3247.js %username%_SCANNED_869621.ZIP-> extracted file:unpaid-6981.js %username%_UNPAID_116521.ZIP-> extracted file:unpaid-8255.js legend: %username% = local part of the email address

Read More >

Need a Password for a Stolen iPhone?

Apple’s “find my iPhone” is one of the most useful reasons to be connected to iCloud. If your iPhone is lost you can leave a message onscreen for the finder to contact you.  Since the introduction of iOS7, the activation of “find my iPhone” also prevents erasing/resetting of the phone

Read More >

Locky Returns After 22 Day Break with Sandbox Evasion Techniques

There has been much speculation in the Internet Security industry about the status of Locky – the ransomware heavyweight of February-May 2016 which suddenly ceased distribution at the start of June. As we previously reported Locky was distributed in vast email outbreaks, many times exceeding 10 billion emails/day and often

Read More >

Resilient Office Moves to SOMA!

We have moved to a new office, leaving the more formal FiDi behind and taking a bold step across Market Street to our new home in SOMA! It’s like a whole new world over here, with our own micro-climate in SF Climates app, more casual dress codes, and lots of

Read More >

Resilient Adds Google Authenticator to Its Network

We are happy to announce that we’ve added Google Authenticator to our menu of pre-integrated authentication methods. You can now include this widely used method when creating adaptive access policies to protect your documents and apps. Google Authenticator is based on a Time-based One-Time Password (TOTP) that is generated by the Google

Read More >