BLOG

Welcome to Infocyte's blog — featuring company news, product updates, cybersecurity best practices, threat hunting and incident response insights, and more.

Happy Holidays from Infocyte

December 22, 2017
infocyte holiday graphic

Happy Holidays from all of us at Infocyte. Here’s a quick reflection back on 2017…

Read More

The Ghosts of Cyber Past, Present and Future

December 20, 2017
classic cyber hacker stock photo

The holiday shopping season is well upon us. In the US 2017 holiday online sales are at an all-time high, with online transactions on Cyber Monday in the US reaching a record $6.59 billion. With online holiday shopping quickly becoming the preferred choice of consumers over brick and mortar stores, consumers and retailers need to be on the lookout for Cyber Ghosts, that unlike Scrooge’s visitors, come for those with a generous spirit. But don’t despair there is hope if you change your old cybersecurity ways.

Read More

Compromise vs Vulnerability Assessments: Which Should You Choose First?

December 14, 2017
cyber risk compromise assessment

During the recent International Cyber Security and Intelligence Conference info security execs were lectured on the importance of being proactive vs reactive to stop cyberattacks. As part of a proactive strategy speaker Nik Alleyne, senior manager of cyber security at Forsythe Solutions Group, recommended vulnerability assessments and regular penetration tests. While these are important tools for evaluating cybersecurity risk, they only answer half of the security paradox; “Can I be hacked?” They do not answer the more vital question; “Am I already breached?”

Read More

False Alarm or Real Threat? The Dangers of Alert Fatigue

December 7, 2017
siem alert validation

Many enterprises rely on security information and event management (SIEM) solutions to help detect suspicious activity on their networks. However, despite SIEM’s attempts to dedup, contextualize, and correlate thousands to millions of alerts daily, many organizations find themselves drowning in irrelevant and/or false positive data. The resulting ‘alert fatigue’ increases the likelihood that a real threat will be missed, wreaking havoc on your systems and reputation.

Read More

6 Host Indicators of Compromise to Hunt For

November 30, 2017

Proactive threat hunting is quickly becoming a must for any organization that’s serious about protecting itself and its bottom line. But where do you start? We’ve assembled a list of the top 6 host indicators of compromise that every organization needs to be looking for to find hidden malware and APTs that threaten the security of your systems and data.

Read More

The ATM Malware Update

November 20, 2017
atm hacking malware

Banks continue to come under designed attack from malware and APTs. Indeed, the prevalence of financial malware is more than double that of ransomware. Overall, the cybersecurity threat landscape has made significant advancements to target verticals with high value assets and business models, making the financial sector in general a prime target.

Read More

Ensure Hackers Don’t Shop Your POS Data this Holiday Season

November 15, 2017
retail hacking terminal

The holidays signal the peak shopping season for both brick and mortar shops and online retailers. This year’s sales are predicted to bring in $682 billion for US retailers alone. But as the holiday shopping season approaches, we also need to brace for more retail focused cyberattacks from Point Of Sale (POS) malware attacks to retail and bank account takeovers.

 

Read More

The Evolution of Cybersecurity and the Rise of Threat Hunting

November 8, 2017

Security approaches need to evolve. Most IT and security pros continue to believe that the best shield against cybercrime involves strengthening a network’s perimeter to keep attackers out and antivirus software for endpoint defense. The need for new security approaches that improve response time or action has never been more apparent, as threats (unfortunately) arise more quickly than security strategies.

 

Read More

Dark Tales from the Cyber Crypt: How to Hunt in the Shadows

October 31, 2017

Cybersecurity pros beware, your systems may be lurking with untold dangers and shadowy characters that could be the source of never-ending nightmares. The good news is you don’t have to run in terror from these threats. Like any good vampire slayer or werewolf hunter, you just need a strategy and the right tools to stop them in their tracks.

Read More

New Infocyte HUNT App for Splunk Enterprise Provides Data-Centric, Post Breach Detection

October 25, 2017

Infocyte has developed a new integration with Splunk Enterprise to provide users with enhanced data-centric hunt, incident investigation and response capabilities. The new Infocyte HUNT App integrates Splunk Enterprise with the Infocyte platform to provide Splunk users with post breach detection, leveraging Forensic State Analysis (FSA) for more comprehensive and scalable detection of fileless implants, persistence mechanisms and forensic evasions. 

Read More