Category: Blog

The OPM Data Breaches – Doing Business in a Zero Trust Environment

The data breaches at the OPM have significant ramifications for the government and for the millions of us that may be negatively impacted in the future. However, breaches present a unique impetus to drive much needed change in policies, technologies and monitoring. It has been reported that the breach was

The World of Limitless Identity

When I joined Resilient Network Systems as CEO roughly a year and a half ago, I was very excited about how the company was revolutionizing the world of information sharing and creating a safer Internet.  Being able to safeguard the data being accessed, while enabling more sharing and collaboration is

Bartallex special delivery: Fareit and Vawtrak

Earlier this year we witnessed several enterprises being targeted by Bartallex in spam emails. Bartallex uses Microsoft Word documents and social engineering techniques to trick enterprise users into opening and executing the embedded macro code in the document. When enabled, the macro code downloads and executes banking malware Dridex, a

Rise of Malicious Resumes in the Fall Hiring Season

Summer is finally over and it’s time for employers to refocus and take advantage of the remaining budget for the year to get new recruits in before the holiday season starts. Essentially, fall season is the time when people like fresh college graduates come into the market looking for new

Domain Validation (DV) SSL Certificate used for PayPal Phishing

As users become more aware of phishing and data theft, they become more cautious. Unfortunately as users become more cautious, attackers must become more devious. In a recent discovery, we found a phishing website that had been issued a valid SSL Certificate. SSL Certificates are small data files that activate

Q2 Cyber Threats Report: The Enterprise Under Attack

While high-profile data breaches may have declined in frequency during the quarter, they most definitely rose in impact. The fallout from the US Government Office of Personnel Management (OPM) data breaches continues to be felt, the latest example of which being that GSA has placed contracts for post-breach protection for

Phishing for the big phish in United Kingdom’s plentiful waters

In 2014, the phishing URLs tracked by CYREN increased dramatically, rising 233% from the previous year. Why did this number increase? One reason is the potential for monetary gain. Cyber criminals use phishing attacks to steal personally sensitive and identifiable information from users. Sometimes this is to gain access to

New Tricks of Macro Malware

In the past few months, we have noticed a rise in spam emails that have an attachment of “.DOC” extension filename but actually is a “.MHT” file. This trending trick seems to be a new way to spread macro malware. A file with “.MHT” extension is a Web page archive

Lessons Learned from the Slack & Hipchat Breaches

In late March Slack confirmed they had suffered a security breach where “there was unauthorized access to a Slack database storing user profile information”. Slack is a recently launched team collaboration tool that offers organizations a way to simplify communications, file-sharing, project management and more. Organizations sign up their employees

CEO, Spires testifies on OPM Breach at Congressional hearing

I am very pleased Mr. Hyde agreed to join to my growing Board of Advisors.  His decades of experience in the Resilient Network Systems’ CEO, Richard Spires, formerly CIO of the U.S. Department of Homeland Security and of the IRS, was invited to testify before the Senate Appropriations Subcommittee on Financial