The Biggest Online Attack in the History of the Internet??

By  Berk Veral, Senior Product Marketing Manager, RSA …And they did it, they managed to slow down the internet. Next thing you know, they will break it! I am referring to what’s been called “the largest publicly announced online attack in the history of the Internet.”  And this week we read about the suspect; a…

Where has the £650 million gone?

The UK government has identified cyber security as a key area of focus and new investment and in 2011 announced a budget of £650 million to shore up defenses in the UK.  So after two years, let’s examine how it’s been spent. Here’s some of the good things that have resulted from the investment SOCA…

Zeus FaaS Comes to a Social Network Near You

By Limor S. Kessem, Cybercrime and Online Fraud Communications Specialist, RSA FaaS: Never a Dull Moment The cybercriminal practice of operating Trojans and botnets has a long history on the Internet, an especially thriving one since the release of the first commercial banking Trojan, Zeus, in 2007. Since then, the ever-evolving world of financial malware…

Cybercriminals & Big Data Analytics

By Kate McGavin, Senior Product Marketing Manager Big Data is the buzzword making headlines today. From improving medical diagnosis and treatment to energy conservation, businesses around the world are using Big Data analytics to transform the data they store into actionable information.  Even here at RSA/EMC, we are working to leverage Big Data analytics to…

Common Indicators Used to Find Evil

By Grant Warkins Advisory Practice Consultant RSA/NetWitness Incident Response Based on the last few Incident Response engagements I’ve participated in, the most common question I’ve heard is “what are the common indicators you are using to find evil?” This is not a question that has a simple answer.  In this blog post, I’ll examine a…

Tales from the Darkside: Another Mule Recruitment Site

By Steven Sipes, Consultant Research Analyst, RSA FirstWatch The underground economy is a complex world built by criminal organizations.  These criminal organizations specialize in one or more of the individual elements or services that, collectively, work together form the underground economy.  One such service is mule recruitment.  While mule recruitment may just be a portion…

Business Continuity: How to Apply Enterprise Risk Management to Your BCM Planning Efforts…and Vice Versa!

by Patrick Potter, RSA Archer GRC Solutions Business Continuity Management (BCM) programs typically do a good job of evaluating business criticality through performing Business Impact Analyses (BIAs) to determine recovery priorities.  However, how many BCM and IT Disaster Recovery (DR) programs adequately assess risks starting at the overall program level down to the process or…

Digital Identities: I Have One For Sale

The term digital identity is so suiting to who we really are online.  Think about the accounts you log in to on a regular basis, the activities you perform each day, the way you communicate with others…most of our lives are digital.  In a research study by Harris Polls (commissioned by RSA) on digital identities,…

The “Switch Target” Part II – The Three “R’s” of Cyber Defense?

By Peter M. Tran, Senior Director, RSA Advanced Cyber Defense Practice In Part I of my post on Switch Targeting, I discussed the fundamentals of how adversaries use seemingly trusted hop points as vectors in and out of primary targets similar to how bank robbers target, stage and execute their robberies. Now I want to…

Beyond the Zero Day: Reverse Engineering Malicious Class Files

By Erik Heuser, RSA Advanced Cyber Defense Services Advisory Practice Consultant In part 1 of this blog, “Beyond the Zero Day” we focused on detecting malicious JVM [Java Virtual Machine] activity and identifying the ‘blob’ that was downloaded.  No subsequent network activity was detected after the download, but that doesn’t discount successful malware delivery and…