LockBit2.0, Beyond Privacy and Security

LockBit Countdown Screen Capture

Lockbit2.0, beyond privacy and security This document describes the recent Cyber Attacks on Accenture that reportedly affected over 2,500 computers and leaked client information. LockBit threat actors posted the names of companies and their logos on their dark web site. They threatened to publish the data stolen during the Accenture ransomware attack. The threat actor […]

2021 Cybersecurity Company Awards

CyCraft Technology Wins Multiple 2021 Cybersecurity Excellence Awards CyCraft Technology, the fastest growing Cybersecurity firm in Asia, is excited to announce that the 2021 Cybersecurity Excellence Awards has recognized their security operations (SecOps) platform CyCraft AIR as a gold winner in multiple categories, including: Gold Winner – Advanced Persistent Threat (APT) Protection Gold Winner – […]

Is Your Supply Chain Under Attack?

When a threat actor compromises your system through an outside partner with access to your systems and data, this is what we call a supply chain attack. We have observed that attacks on supply chains have increased in numbers (66%) and sophistication, based on 2021 research. Organizations with string security protection alone are no longer […]

What is RansomExx?

A RansomEXX ransom note

Executive Summary This document describes the recent Cyber Attacks on StarHub and Gigabyte servers. The attack exploited vulnerabilities in a Gigabyte server. It impacted approximately 800 businesses using Starhub/Gigabyte equipment and 1,500 businesses using Gigabyte equipment worldwide. PC component maker Gigabyte and Singapore Telco StarHub were compromised in an attack targeting several of their internal […]

An Introduction To MITRE ATT&CK

MITRE ATT&CK vs. Cyber Kill Chain vs. Diamond Model In cybersecurity, there have been several approaches used to track and analyze the various characteristics of cyber intrusions by advanced threat actors. Two Seminal Approaches to Intrusion Analysis 1. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains In 2011, the […]