Cybersecurity, Networking, News and Events
Vertek Cybersecurity Sponsors 2019 New York Tech Summit
We were pleased to sponsor and attend the New York State Tech Summit on June 6-7, 2019! Chris Ackley, Channel Sales Manager and Chris Maulding, Sr. Security Engineer attended the...
Cloud Computing, Cybersecurity, Networking, News and Events
Vertek Cybersecurity Sponsors Whalley Computer’s 7th Annual City Technology Roadshow!
Five cities traveled in the month of May! We have been busy and on the road through the month of May with one of our newer regional partners, Whalley Computers! ...
Cloud Computing, Cybersecurity, Resources, Threats and IoCs
Managed Threat Intelligence: Managed SIEM & SOCaaS Powered by Vertek in 90 seconds
Quickly learn why your organization needs MTI powered by Vertek, and how it will protect you and your customers! Managed Threat Intelligence by Vertek from Vertek on Vimeo. Managed Threat...
Cybersecurity, News and Events
AT&T invites Vertek to attend Channel Partners Las Vegas!
Several Vertek team members had the privilege of attending Channel Partners April 9-12 2019 in Las Vegas, Nevada. This event was a very good event for us, not only were...
Cloud Computing, Cybersecurity, Networking, News and Events, Resources
SIEM: DIY or Managed Threat Intelligence
There’s no doubt that today’s security information and event management (SIEM) solutions are powerful tools. Providing the best way to defend against dangerous cyber threats, a SIEM delivers a 360-degree...
Cloud Computing, Cybersecurity, Networking, Resources
How to Cement Your Trusted Advisor Status with Managed Threat Intelligence
Each day, the cybersecurity landscape is expanding in complexity and the volume of threats generated. The emergence of mobile computing and the introduction of new devices on the network opens...
Cybersecurity, Networking, Resources
Ask These Critical Questions About Compliance and Managed Threat Intelligence
IT compliance management is often a manual and tedious effort. It requires teams to monitor several IT security point products and pull together information from multiple sources to demonstrate compliance...
Cloud Computing, Cybersecurity, News and Events, Resources
What is a SIEM and Why Does My Customer Need One?
It used to be the case that perimeter security solutions were enough to keep the good guys in and the bad guys out of the enterprise network. The tools worked...
Cybersecurity, Resources, Threats and IoCs
A Vertek Threat Intelligence Analyst Identifies Trik Spam Botnet Leaks 43 Million Email Addresses
A Threat Intelligence Analyst on Vertek’s Cybersecurity team recently discovered a massive spam recipient list from a bad threat actor’s botnet after analyzing a malware sample that was distributed via...
Cybersecurity, Resources, Threats and IoCs
Microsoft Patches IE Zero-Day Dubbed “Double Kill”
Threat Summary On May 8th 2018 , Microsoft released critical security updates to patch a Remote Code Execution (RCE) vulnerability in the VBScript engine. The APT attack was discovered in...
Cybersecurity, Resources, Threats and IoCs
Microsoft Patches 17 year old MS Office Memory Corruption Flaw
Threat Summary This blog is regarding a memory corruption vulnerability in the equation editor of Microsoft Office that affects all versions from 2000 to Office 365. The vulnerability is being...
Resources, Threats and IoCs
Detection and Prevention of Bad Rabbit Ransomware
Summary There have been numerous reports of a new ransomware outbreak called BadRabbit, which started to spread via “drive-by” download attacks of infected sites imitating a fake Adobe Flash update....
Threats and IoCs
Malware distributed via MS Office DDE “feature” — no macros required!
What is DDE? DDE (Dynamic Data Exchange) is a protocol used to transfer data between applications and provides the ability for applications to launch other applications. With DDE it’s quite...
Resources, Threats and IoCs
Locky ransomware switches up extension with asasin variant
Email campaigns pushing Locky ransomware are still very prevalent and continue to evolve. Encrypted files are now appended with the .asasin extension. This particular analysis shows that the threat actors...
Resources, Threats and IoCs
Browser-based Cryptocurrency Mining Ramping Up
Our SOC has observed several cases of browser mining (also referred to as “cryptojacking”) as of late where javascript libraries are being utilized on various webpages to leverage their visitor’s...
Resources, Threats and IoCs
Subscribe to Vertek’s Public OTX Feed
Vertek’s OTX Public and Private Pulses provide a summary of the threat, some information regarding the software targeted, and the related indicators of compromise (IoC) that can be used to...
Threats and IoCs
Latest Locky Variant Encrypts with Ykcol Extension – IoCs and OTX
As you can see, our labs team is still seeing Locky is being distributed in a lot of malspam campaigns. This is just a brief variant update. When infected with...