Blog

Insights on Data Security & Threat Intelligence

Where is Resilient headed in September?

As our SF summer winds down and we head into fall, things are heating up, and we’re not just talking about the temperature. The Resilient team is headed to 4 conferences in September, covering both government and enterprise markets, on both coasts. We are looking forward to reconnecting and meeting new

Read More >

Clean Up ROT! Make ECM Really Work For Your Company

Clean Up ROT! Make ECM Really Work For Your Company Holding on to items you don’t need around the house can cause a lot of clutter. Outdated paper documents, unwanted hostess gifts, broken knick-knacks you may or may not get around to gluing back together – usually it’s all just

Read More >

New Cyberthreat Report: A Deep Dive on Phishing

I can’t remember the last time I read the news where I didn’t see a headline that involved a business becoming a victim of cybercrime due to phishing. Both big and small organizations are targets, with CEOs falling victim to “whaling” (phishing targeted at executive staff) as often as regular

Read More >

Resilient Partners with FinalCode DRM to Protect Data Everywhere

The digital right management sector is an excellent fit for Resilient’s adaptive access management capabilities, and we are very excited to announce our partnership with FinalCode. The combined power of our two technologies will help enterprises and government agencies securely share files and collaborate across boundaries, by ensuring that the right users

Read More >

Locky Ransomware Now Embedded in Javascript

A new wave of Locky malware emails have been making the rounds since yesterday — July 20, 2016 — with a critical new development, whereby the Windows executable is now embedded in JavaScript. Essentially, the attached JavaScript file has evolved from being a downloader component into becoming the actual ransomware.

Read More >

Locky Distributors Switch to Word Macro and then WSF Files

Locky Ransomware continues to be distributed in large numbers, however, the email attachments have been changed, probably due to greater blocking of the JavaScript files that have been favored until now. The Locky attack begins with an email attachment that downloads the actual Locky ransomware. Last week, the Downloader component

Read More >

Locky Developers Continue to Enhance Ransomware Delivery and Operation

In the past week we have seen a resurgence of Locky malware emails. Some examples of the attachment filenames (there are many variations): DETAILS_%username%_291866.ZIP->extracted file: unpaid-166.js  %username%_ADDITION_744341.ZIP-> extracted file:addition-0106.js %username%_INVOICE_337060.ZIP-> extracted file:unpaid-643.js SERVICES_%username%_793350.ZIP-> extracted file:addition-3247.js %username%_SCANNED_869621.ZIP-> extracted file:unpaid-6981.js %username%_UNPAID_116521.ZIP-> extracted file:unpaid-8255.js legend: %username% = local part of the email address

Read More >