Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Dunihi by Houdini—Middle East Coffee & Spice Company Targeted

Does malware take a coffee break? Perhaps not.  Dunihi malware was found this time embedded in an execute file intended for a leading Middle Eastern purveyor of coffee and spices named Badri & Hania (www.bah.ps). This malware is compiled in Microsoft intermediate language (MSIL) and has an icon that looks

Read More >

CIO Perspective: NIEM: The key to improved information sharing – FCW

Excerpt below is from the article “NIEM: The key to improved information sharing” by Richard Spires, available at:http://fcw.com/articles/2014/12/18/niem-improved-information-sharing.aspx (Abridged) NIEM uses the XML standard to define the content of messages being exchanged. It’s about the data and how it’s structured. Users can also take advantage of tools that implement the

Read More >

What Are BACS Remittance Emails? And How to Spot a Fake One

A couple of days ago, we received a spam email sample that was reported to contain a malicious attachment. The email content poses as a piece of remittance advice for a specific BACS payment.  What is BACS Remittance Advice?  So, let’s explore the definition of BACS remittance advice. In essence,

Read More >

Wiper family of malware targeting Sony Pictures entertainment grows

W32/Wiper.C SHA1 – CB39C8639A2F74A3424D040D22A856859AB559A8 Similar to W32/Wiper.A, this version is also is being distributed by the people behind this threat. Depending on how it is distributed, the victim may launch different file names; the most common are diskpartmg16.exe and dpnsvr16.exe. For this example we will use “diskpartmg16.exe”. The “diskpartmg16.exe” version

Read More >

The Internet of Everything: Be Prepared!

Imagine the Internet of Everything—a world where every single item you touch, from a light bulb to the brake system in your car, has a microcomputer and IP address. All the data stored on the device is accessible 24/7 from anywhere in the world. Now imagine the type of information

Read More >