by Gate 15 | Jul 28, 2017 | Uncategorized
On 27 July, Gate 15’s Kristi Horton and SurfWatch Labs’ Adam Meyer addressed: Recent extortion and ransomware attacks against entertainment and media organizations by TheDarkOverlord Analysis of technical, socio-behavioral and geopolitical circumstances...
by Gate 15 | May 26, 2017 | Uncategorized
About a week ago, as we were coming out of the initial concerns relating to the WannaCry ransomware outbreak, I shared the following thought on LinkedIn: “WannaCry brings up a thought I often have – what is the best way to capture cyber incidents with physical...
by Gate 15 | May 23, 2017 | Uncategorized
Business Email Compromise (BEC) is a more specific form of Email Account Compromise (EAC). Email accounts can be compromised by guessing email credentials, obtaining access by the interception of email credentials, encryption keys, or gaining email account information...
by Gate 15 | May 11, 2017 | Uncategorized
Vocabulary.com defines extortion as “forcing someone into giving you something through threats.” Most commonly the extortioner desires money but it could be anything deemed to be as something of value. The extortioner may desire a decision made in his/her favor or the...
by Gate 15 | Apr 17, 2017 | Uncategorized
Recently, two Gate 15 team members – Kristi Horton, Senior Risk Analyst in Cybersecurity, and Chip Wickenden, Director of Strategic Relationships, had a conversation about ransomware and different kinds of threat actors that took some interesting turns. We...