Blog

Securonix Threat Research: SamSam Ransomware Detection Using Security Analytics

Published on May 15, 2018

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team   Figure 1: SamSam Jex Boss exploitation Introduction SamSam is a prevalent ransomware that has been observed across multiple industries including healthcare, government, and critical infrastructure/ industrial control systems (ICS) in 2016, 2017, and 2018. Earlier this year, the ransomware...

Cutting-Edge Security Analytics Drive Securonix’s Position as Best SIEM Solution

Published on April 30, 2018

SC Magazine’s annual Trust Awards are recognized throughout the security industry as the gold standard of excellence in cybersecurity. Winners of the Trust Award are chosen by a distinguished group of leading IT security professionals selected by SC Media’s editorial team. We at Securonix are thrilled and honored that Securonix’s Next Generation...

Securonix Threat Research: Olympic Destroyer aka NotPetya v2 “False Flag” Cyber Sabotage Attack Detection Using Security Analytics

Published on March 23, 2018

By Oleg Kolesnikov, Securonix Threat Research Team Introduction Last month, we learned of a new cyber attack against the 2018 Winter Olympic Games in South Korea. Securonix Threat Research Team has been actively investigating and monitoring this attack since the attack was reported to help our customers understand the techniques...

User And Entity Behavior Analytics in 2018

Published on March 19, 2018

We’ve all seen big data breaches in the news. We also know there are many more breaches that did not make it into the evening news. The insider attack vector - whether it is a malicious insider, an unsuspecting compromised employee, or accidental misuse, is a common theme across most...

Ch 5 – Feature Engineering: Science or Art?

Published on February 14, 2018

Authors: Securonix Labs Introduction Feature Engineering is the process of selecting and extracting useful, predictive signals from data. The goal is to create a set of features that best represent the information contained in the data, producing a simpler model that generalizes well to future observations. Methods range from statistical...

Don’t Fall Prey To The Next Ransomware Outbreak

Published on February 13, 2018

Over the last couple of years, we have seen the emergence and rapid rise of ransomware as an extremely potent cyber attack. We have observed, and written about attacks like Bad Rabbit, NotPetya, and WannaCry. As businesses increasingly rely on digital systems, networks, and data for operations, the value of...

Seven Things You Need To Know About GDPR

Published on January 31, 2018

The General Data Protection Regulation (GDPR) is around the corner. Here is what you need to know before the compliance deadline. 1. GDPR is a result of the European Commission's effort to revamp how businesses protect data in order to make Europe ready for the digital age. The exercise took...

Securonix Threat Research: Spectre and Meltdown Vulnerabilities

Published on January 11, 2018

By Oleg Kolesnikov, Securonix Threat Research Team Introduction Securonix Threat Research Team (STR) has been actively investigating the details of the Spectre and Meltdown Side-Channel Information Disclosure Vulnerabilities since last week to help our customers mitigate/respond to the vulnerabilities. Below is a summary of what we currently know about the...

Ch 4 – Supervised Learning: Capturing The Thought Process Of An Analyst

Published on December 11, 2017

Authors: Securonix Labs Introduction Supervised learning methods are used for summarizing information contained within data to make predictions. In order to do so, they require a set of outputs (labels) and inputs. The objective is to understand the relationship between them and predict the output on a new unseen input....