[metaslider id=2951] … Read More
Silicon Review Recognizes SnoopWall as Rapidly Growing Breach Prevention Company
NASHUA, N.H., June 5, 2017 /PRNewswire/ — SnoopWall, Inc. (www.snoopwall.com), the world’s first breach prevention company, on the heels of being named as the Top Ranked Security company, three years in a row, by the CyberSecurity 500, has been named one of the 10 Fastest Growing Security Companies for 2017, by the prestigious Silicon Valley publication, The Silicon Review.
“We’re active throughout the globe in more than 32 countries, helping small to medium size enterprises (SME’s) defend against breaches in the most cost-effective way, through our trusted channel partners. It’s truly an exciting growth phase for SnoopWall,” said Mark Bermingham, Global Vice President of Worldwide Channels.
Online related article: http://thesiliconreview.com/magazines/securing-valuable-confidential-information-and-checking-on-cyber-threats-for-organizations-through-its-award-winning-patented-appliances-snoopwall/
“This award is given to a select group of tech companies each year based upon customer adoption and growth metrics. We’re pleased to include SnoopWall, a fast-growing breach prevention security company,” said Editorial Team of The Silicon Review.
“After keeping the pace of 300% growth rate, year over year, we’re thrilled to be named one of the 10 Fastest Growing Security Companies for 2017,” said Gary S. Miliefsky, CEO of SnoopWall, Inc. Miliefsky was also recently named to the Owler Top 100 High Tech CEOs of 2017 of more than 2,200 surveyed.
Have a question about SnoopWall – give us a call
SAN FRANCISCO, Feb. 14, 2017 /PRNewswire/ — SnoopWall, Inc, the global leader in Breach Prevention, today announced receiving the coveted Cybersecurity Excellence Award for its tiny, powerful, cost-efffective NetSHIELD Nano breach prevention appliance.
“We’re humbled and honored to receive this prestigious award from our peers in the cyber and information security space,” said Gary S. Miliefsky, CEO of SnoopWall, Inc. “When small to medium enterprises (SMEs) are looking for a cost effective way to prevent breaches on their intranet networks, they look towards SnoopWall. Our NetSHIELD Nano is an incredibly tiny, powerful and cost-effective breach prevention solution that any SME can afford.”
The Cybersecurity Excellence Award is a prestigious award that honors individuals, products and companies that demonstrate excellence, innovation and leadership in information security. This independent awards program is produced in cooperation with the Information Security Community on LinkedIn, tapping into the experience of more than 300,000+ cybersecurity professionals to recognize the world’s best cybersecurity products, individuals and organizations.
“Congratulations to SnoopWall for winning the 2017 Cybersecurity Excellence Award for Network Access Control (NAC) hardware with their tiny breach prevention Nano appliances,” said Holger Schulze, founder of the 350,000-member Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence and innovation in today’s cybersecurity industry.”
Fitting within the palm of your hands, the patented NetSHIELD Nano is the world’s smallest network access control (NAC) and breach prevention intranet security appliance. This is a tiny, powerful, plug-in-and-protect solution that detects and blocks zero-day malware (0day), ransomware, remote access Trojans (RATs). In addition, in milliseconds it blocks rogue devices, manages the Bring Your Own Device (BYOD) dilemma and, with pinpoint accuracy, finds all vulnerabilities in trusted network assets/devices including on wired and wireless networks and all internet of things (IoT) devices. It has a complete standalone secure web-management interface, as well as support for all major switches, hubs, wireless devices and can send threat feeds to all SIEMs and SIMs over Syslog or SNMP traps plus email alerts. In addition, for larger organizations and MSSPs it can be completely managed remotely through the Command Center of the NetSHIELD Enterprise appliances.
About SnoopWall, Inc.
SnoopWall is the world’s first breach prevention security company delivering a suite of network, mobile and app security products as well as cloud-based services protecting all computing devices from prying eyes and new threats through patented counterveillance cloaking technology. SnoopWall secures mission critical and highly valuable confidential information behind firewalls with our award winning patented NetSHIELD appliances and with WinSHIELD on windows and MobileSHIELD on Google Android and Apple iOS mobile devices with next generation technology that detects and blocks all remote control, eavesdropping and spying. SnoopWall’s software products and hardware appliances are all proudly made in the U.S.A.
Welcome to 2017.
The comment that we have heard most often was thank god 2016 was over; for those involved in cyber security it was also a banner year for threats – a rapid increase in ransomware, a DDOS attack that was facilitated by IoT devices and the discovery of one of the largest cyber security breaches in history. With an election that the world watched having an aura of suspicion surrounding nefarious activities that could have decided the outcome, 2017 is shaping up to be a very interesting year.
In 2016 Security professionals had their job cut out for them. They attempted to stop the threats from breaching the perimeter, purchasing and implementing the latest in “next generation” technologies to satisfy a particular threat, such as ransomware – as opposed to looking holistically at the network in its totality. This piecemeal security implementation, while construed as defense in depth, can also lead to potential vulnerabilities within your network.
Knowledge is Power …. you cannot protect what you, as an organization, do not know that you have.
The best way to be ahead of the game is to be prepared for threats today, tomorrow and five year from now. In order to plan your strategy you need to know what you are protecting and from whom you are potentially protecting it from. Think of it like a football strategy – if you put the strategy in place without know your players or who you are playing against – you will ultimately loose .
An internal cyber security threat assessment will provide an organization with valuable information about their network. The first step in the assessment is to generate a blue print of all of your organizations assets, with key information such as a device IP, host Name, MAC address and operating system.
Once the list is complete, an internal vulnerability assessment will provide the listing of assets that require urgent patches to harden against an attack.
Using the innovative Malware Detection system, the threat assessment will provide a detail of traffic that is communicating to known command and control servers ( C&C), websites that are outside corporate policy (such as those located in high risk countries), as well during your assessment it will block potential ransomware attacks such as CryptoLocker for Windows and Linux.Encoder.1 for Linux. If compliance is a requirement, complete the assessment for PCI, HIPAA, SOX or ISO 92001.
The Cyber Threat Assessment is being offered by Symtrex using the SnoopWall NetShield Network Access Control. The SnoopWall Netshield is an IntraNet Security product, install for 45 days and run a comprehensive internal network evaluation, which will include asset detection, identify critical vulnerabilities, assist in hardening and managed your trusted assets, detect and block rogue/malicious devices, and audit and enforce compliance & regulatory requirements.
Contact us to find out more or to coorindate your Cyber Threat Assessment
Contact centre agents should be warned about allowing alleged customers sending them email with attachments after a security vendor discovered a new wave of attacks against three customers including North American hospitality companies, attacks similar to ones from the Eastern European based Carbanak crime group
In a blog posted Monday, Trustwave said it came to that conclusion after investigating incidents.
In one instance an attacker called a customer contact line saying that they were unable to use the online reservation system so wanted to send their information to the agent by email attachment, said the report. The attachment was a malicious Word document that contained an encoded .VBS script capable of stealing system information, desktop screenshots, and to download additional malware. The malware replaced text in a Word document with that of its own, which to the agent looks like a request for information from the hotel for a corporate function.
The malicious VB Script will use macros to search for instances of Microsoft Word running on the system, if found, it will clear the existing text and replace it. “This malware was capable of stealing significant system and network information,” says Trustwave. “It was also used to download several other reconnaissance tools to map out the network.” Downloaded tools have included Nmap, FreeRDP, NCat, NPing, and others.
Beaconing messages are sent out to 184.108.40.206 via standard HTTP GET requests every five minutes, said Trustwave, to let a command and control server know a system has been compromised. “Using this simple methodology allows the beaconing to hide very well within standard corporate network traffic.” However, the report adds, its uniformity of structure also allows analysts to identify it relatively quickly as well.
If not stopped, however, the process downloads malware that executes a new iteration of svchost.exe and injects its malicious code into this running process. This hides the malware within the svchost.exe process. It then searches Kaspersky antivirus processes and terminates them if running on the victim system.
It then downloads kldconfig.exe, kldconfig.plug, and runmem.wi.exe, which Trustwave says are all well-known Carbanak malware tools. Variations of them were used in the banking intrusions in 2015. Additionally, the decrypted code references “anunak_config” which is the encrypted configuration file that it downloads from its control server. The Anunak crime group is generally believed to be synonymous with Carbanak.
“This malware is very multi-functional as it can enable remote desktop, steal local passwords, search user’s email, target IFOBS banking systems (which Carbanak used so effectively in recent banking attacks), or install completely different remote desktop programs, such as VNC or AMMYY … Finally, this malware, like so many others, is designed to target credit card data by scraping memory on Point-of-Sale systems., which is presumably the end goal.”
In short, “the attacker uses social engineering to gain their foothold in the victim network, downloads reconnaissance tools to scan the network and move laterally into the card holder data environment, and then infects systems able to process card transactions.”
“The persistence, professionalism, and pervasiveness of this campaign is at a level rarely seen by Trustwave.” says author Brian Hussey, the company’s director of global incident readiness and response. “The malware used is very multifaceted and still not caught by most (if any) antivirus engines. The social engineering is highly targeted, conducted via direct phone calls by threat actors with excellent English skills. The network reconnaissance and lateral movement is rapid and highly effective. Finally, the data exfiltration methodology is stealthy and efficient.”
Have a question on how to protect yourself – give us a call 866-431-8972.
Q3 cyber threat study by Kaspersky Lab says ransomware modifications have risen 3.5 times and newer countries are coming under attack.
A study of the cyber threat landscape from July to September 2016 by Kaspersky Lab reveals that ransomware attacks have more than doubled in Q3 with modifications rising 3.5 times and affecting 821,865 people. The Q3 report also points out that banking malware has risen by 5.8% and maximum exploits are being designed to target browsers (45%) and Android OS (19%).
The IT threat evolution report for Q3 says cybercriminals appear to have moved to greener pastures with places like Croatia, South Korea, Tunisia, and Bulgaria featuring for the first time in the list of the top five ransomware-attacked countries.
Also noticeable was Trojan-Downloader.JS.Cryptoload being behind most of the attacks with CTB-Locker, Locky and CryptXXX highly popular.
“Crypto ransomware continues to be one of the most dangerous threats, both to private users and to businesses,” explains Fedor Sinitsyn of Kaspersky Lab.
Have a question on how to prevent ransomware from your network – give us a call, or drop us an email.