Blog

ransomware key
BAD RABBIT, EXPETR MAKE YOU WANNACRY Two large-scale global ransomware attacks this year were the infamous global WannaCry and ExPetr (also known as Petya and NotPetya). The WannaCry or WannaCrypt ransomware attack affected more than 230,000 computers in over 150 countries. And now a third attack, dubbed “Bad Rabbit”, is on the rise. So what exactly are these attacks and how do they work? How extensive is their reach and what’s the damage? More importantly, how...
International Fraud Awareness Week 2017
Ascension Global Technology Proudly Supports International Fraud Awareness Week, Nov. 12-18 2017 SAINT PETERSBURG, FL– Fraud costs organizations worldwide an estimated 5 percent of their annual revenues, according to a study conducted by the Association of Certified Fraud Examiners (ACFE). The ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion. The seriousness of the global fraud problem is...
A new Petya Ransomware variant hits Russia and Ukraine Please join our webcast for additional details regarding this attack.  Thursday, October 26th, 2017 | Americas – 8:30 AM PDT (4:30 PM UK, 5:30 PM CET) Introduction Almost four months after the last major outbreak, we are seeing a new variant of Petya ransomware dubbed “Bad Rabbit,” impacting multiple businesses, primarily in Russia and Ukraine. There have also been reports of businesses impacted in Germany, Turkey, and other countries. The ransomware payload contains...
With Hurricane Irma impacting Florida this weekend we want to ensure all of our clients, friends & family are prepared. This storm is projected to be a Category 4 or 5, and we anticipate a severe impact all across the state.   Please carefully read through the county’s Hurricane Preparedness Guide and make a plan for your family if you will be staying to ride out the storm or evacuating. http://www.pinellascounty.org/emergency/prepareahead.htm   Here are a few...
See how AutoNation, the largest auto retailer in the United States, puts an end to the idea of deploying costly stacks of iron (appliances) by adopting Zscaler Cloud Security platform. Ken Athanasiou, CISO and Vice President AutoNation talks about their cloud-first approach and how Cloud Security is essential to the business, making Zscaler a critical part of their digital strategy. As a premier partner of Zscaler, reach out to Sales@Ascensiongt.com can help you with your...
Your IT environment has evolved significantly over the past decade, expanding from a centralized data center approach to a more cloud and mobile-centric model. Attackers have adjusted their tactics along the way, shifting their focus from servers in your data center to your users and web browsers, and developing cyber-attacks that elude traditional signature-based security methods Unfortunately, enterprises have largely failed to keep pace with these changes, continuing to use dated methods to thwart attacks,...
Webcast – Thursday, August 17, 2017|Americas – 8:30 am PDT (16:30UK, 17:30 CET) What does your bandwidth traffic look like? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity? With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, live-streaming sporting events, and even over non-critical business traffic. KEYNOTE SPEAKER    ...
FruitFly Surveillance Malware Hits American Macs Law enforcement agents are investigating what appears to be a slice of malicious code, dubbed FruitFly, that’s been hitting Mac users in recent weeks. According to Forbes, Patrick Wardle, an ex-NSA analyst who now does research for cybersecurity firm Synack, says he saw around 400 infections, but there’s likely much more as he only had access to a handful of servers used to control the malware. Read more.  Wells Fargo...
Today we are proud to announce the CrowdStrike Falcon® Search Engine, the largest and fastest search engine exclusively for cybersecurity professionals. We recognize the transformative effects that search engines have had in other areas of our lives, and now were are bringing those benefits to the security industry. A search engine for cybersecurity means faster research and fuller understanding of a threat and its context — advantages that help CrowdStrike customers get ahead of, and...
Executive Summary This technical analysis is a continuation of the previous technical blog (NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft) describing the threat of NotPetya, a destructive malware with self-propagation capabilities. After further analysis, CrowdStrike researchers discovered: How the NotPetya DLL loads functions to ensure proper cleanup from the victim machine The order in which the infection process takes place Potential for recovery of the victim machine’s MBR and...