Category

Blog
ransomware key
BAD RABBIT, EXPETR MAKE YOU WANNACRY Two large-scale global ransomware attacks this year were the infamous global WannaCry and ExPetr (also known as Petya and NotPetya). The WannaCry or WannaCrypt ransomware attack affected more than 230,000 computers in over 150 countries. And now a third attack, dubbed “Bad Rabbit”, is on the rise. So what exactly...
Read More
International Fraud Awareness Week 2017
Ascension Global Technology Proudly Supports International Fraud Awareness Week, Nov. 12-18 2017 SAINT PETERSBURG, FL– Fraud costs organizations worldwide an estimated 5 percent of their annual revenues, according to a study conducted by the Association of Certified Fraud Examiners (ACFE). The ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational...
Read More
A new Petya Ransomware variant hits Russia and Ukraine Please join our webcast for additional details regarding this attack.  Thursday, October 26th, 2017 | Americas – 8:30 AM PDT (4:30 PM UK, 5:30 PM CET) Introduction Almost four months after the last major outbreak, we are seeing a new variant of Petya ransomware dubbed “Bad Rabbit,” impacting multiple...
Read More
With Hurricane Irma impacting Florida this weekend we want to ensure all of our clients, friends & family are prepared. This storm is projected to be a Category 4 or 5, and we anticipate a severe impact all across the state.   Please carefully read through the county’s Hurricane Preparedness Guide and make a plan...
Read More
See how AutoNation, the largest auto retailer in the United States, puts an end to the idea of deploying costly stacks of iron (appliances) by adopting Zscaler Cloud Security platform. Ken Athanasiou, CISO and Vice President AutoNation talks about their cloud-first approach and how Cloud Security is essential to the business, making Zscaler a critical...
Read More
Your IT environment has evolved significantly over the past decade, expanding from a centralized data center approach to a more cloud and mobile-centric model. Attackers have adjusted their tactics along the way, shifting their focus from servers in your data center to your users and web browsers, and developing cyber-attacks that elude traditional signature-based security...
Read More
Webcast – Thursday, August 17, 2017|Americas – 8:30 am PDT (16:30UK, 17:30 CET) What does your bandwidth traffic look like? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity? With more traffic bound for the Internet, it is essential that business apps,...
Read More
FruitFly Surveillance Malware Hits American Macs Law enforcement agents are investigating what appears to be a slice of malicious code, dubbed FruitFly, that’s been hitting Mac users in recent weeks. According to Forbes, Patrick Wardle, an ex-NSA analyst who now does research for cybersecurity firm Synack, says he saw around 400 infections, but there’s likely...
Read More
Today we are proud to announce the CrowdStrike Falcon® Search Engine, the largest and fastest search engine exclusively for cybersecurity professionals. We recognize the transformative effects that search engines have had in other areas of our lives, and now were are bringing those benefits to the security industry. A search engine for cybersecurity means faster...
Read More
Executive Summary This technical analysis is a continuation of the previous technical blog (NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft) describing the threat of NotPetya, a destructive malware with self-propagation capabilities. After further analysis, CrowdStrike researchers discovered: How the NotPetya DLL loads functions to ensure proper cleanup from the...
Read More
1 2