At Securolytics we recently discovered a new wave of social engineering attacks through email. The messages were being sent with a malicious PDF document attached. The email subject was- Read more “Attacking Through Social Engineering”
The Internet Content Adaptation Protocol was first proposed in 1999, however it’s perhaps one of the lesser known protocols on the Internet.
ICAP is defined in RFC 3507 whose basic premise is to provide sideband content filtering/modification of HTTP requests. It would normally be used in conjunction with a web proxy/cache. Its most common use would perhaps be to provide virus scanning of web content before being passed onto the user. Read more “An ICAP Primer”
In September 2015, cybercriminals stole 10 million personal records from Excellus BlueCross BlueShield. Get a behind the scene look at how these criminals infiltrated Excellus and walked out the front door with PHI. Read more “Inside the Excellus Breach”
The Advanced Threat Defense engine in Securolytics Web Security recently detected and blocked downloads of an executable file that we found very interesting. The blocked file was the installer for a program called ReimagePlus. We thought it would be useful to provide some analysis of this program to illustrate how Securolytics Web Filtering is able to protect our customers from having potentially problematic programs introduced into their systems. Read more “Removing ReimagePlus Adware”
On October 07, 2015 our platform monitoring systems detected a new wave of spam emails with malicious doc files. The decoy, which purported to be an Amazon invoice, was directly attached to an email targeting small businesses. The originator field was email@example.com and each email had an attachment with name like amazon_invoice.doc. Read more “Amazon Zero Day Exploit”