Vertek’s OTX Public and Private Pulses provide a summary of the threat, some information regarding the software targeted, and the related indicators of compromise (IoC) that can be used to detect threats. Vertek utilizes several methods and various tools to obtain IoCs we feed into our Pulses. Please test accordingly and use at your own discretion. IoCs types include IP addresses Domains Hostnames (subdomains) Email URL URI File Hashes: MD5, SHA1, SHA256, PEHASH, IMPHASH......
Escalating and Evolving Fear/Events It’s clear that we are all targeted Multiple attack vectors are in play Attack surfaces...Read More
It’s important to note that preventing attacks is becoming more and more involved due to threats being targeted across...Read More
Cyber security officials from the Securities and Exchange Commission (SEC) agree that data theft is not a question of if...Read More
We all know that maintaining a secure network is the first defense against cyber attacks from external threats, but...Read More