Ransomware
FAQ – What Are The Types Of Ransomware?
It is important to understand the various stages of a ransomware attack. Knowing these different stages will allow you to have a better of understanding how to defend against them.…
Read moreFAQ – Why Has Ransomware Become So Popular?
Ransomware has been around for over 3 decades. Only now though has it become majorly widespread as a form of cybercrime. Roughly 1/4 of all malware incidents are caused by…
Read morePart 3 De-Anonymizing Domains on the Dark Web – Favicon matching
Favicon Matching The second method that is used to uncover a dark web based website on the surface internet (clear internet) is the process of "favicon matching". A favicon is…
Read morePart 2 De-Anonymizing Domains on the Dark Web – TLS Certificate Matching
The first approach used by Cisco's Talos Threat Intelligence team was that of TLS certificate matching. With this approach the self signed certificate that is used by their dark web…
Read moreThe Ability to De-Anonymize Domains on the Dark Web
Members of the Cisco Talos Threat Intelligence team have developed 3 techniques to identify ransomware operators websites hosted on the dark web and their respective IP Addresses. This has given…
Read moreHow to Mitigate Malicious OneNote Attacks and the Indicators of Compromise
This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…
Read more




