File Integrity Monitoring (FIM): Your Friendly Network Detective Control

Lateral movement is one of the most consequential types of network activity for which organizations need to be on the lookout. After arriving at the network, the attacker keeps ongoing access by essentially stirring through the compromised environment … Continue reading File Integrity Monitoring (FIM): Your Friendly Network Detective Control

Red Flag Alert: Service Accounts Performing Interactive Logins

In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. 
On the contrary, we at Preempt see something that happens just as frequently: failing to limit exposed and vulnerable service a… Continue reading Red Flag Alert: Service Accounts Performing Interactive Logins

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus (North Korea), Fancy Bear (Russia) or menuPass (China) only target public federal organizations in Western nations like the U.S. This is simply not the case. In fact, attacks… Continue reading What State-Sponsored Attacks Can Teach Us About Conditional Access

The MITRE ATT&CK Framework: Lateral Movement

It will be rare that an attacker exploits a single system and does not attempt any lateral movement within the network. Even ransomware that typically targets a single system at a time has attempted to spread across the network looking for other victim… Continue reading The MITRE ATT&CK Framework: Lateral Movement

Threatlist: Manufacturing, a Top Target for Espionage

Vectra’s 2018 Spotlight Report found that attackers can easily spy, spread and steal information, largely unhindered by the insufficient internal access controls that are in place. Continue reading Threatlist: Manufacturing, a Top Target for Espionage

Highly Targeted Ransomware SamSam Earned Its Creator $6 Million

A ransomware threat called SamSam that’s known for crippling IT systems in hospitals, schools and government organizations has made many more victims than previously believed. Security researchers from Sophos worked with cryptocurrency tracking … Continue reading Highly Targeted Ransomware SamSam Earned Its Creator $6 Million