GSPBC-1002: Credential Access – Spearphishing – Phishing
Katherine Kostreva2022-05-01T20:45:07+00:00Phishing Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns. Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may ... Read More
GSPBC-1000: Impact – Data Encrypted For Impact – Ransomware
Katherine Kostreva2022-05-01T20:31:08+00:00Data Encrypted for Impact Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) ... Read More
TomCast XIII: Risk Management
Katherine Kostreva2022-05-01T20:52:01+00:00Hello! Welcome back to this next TomCast from GuardSight; we are a tactical cybersecurity-as-a-service organization dedicated to helping businesses protect their data, their assets, and their endpoints. Today’s discussion is going to center around risk management. Wait…didn’t we just release a TomCast about this same topic two weeks ago? No, that was about vulnerability management which is a PART of risk management. Risk management is defined by Oxford as the forecasting and evaluation ... Read More
TomCast X: Incident Response
Katherine Kostreva2022-05-01T20:50:23+00:00Hello! Welcome back to this next TomCast from GuardSight; we are a tactical cybersecurity-as-a-service organization dedicated to helping businesses protect their data, their assets, and their endpoints. Today’s discussion is going to center around Incident Response. We have a few guests with us for this TomCast; please welcome GuardSight members Justin Fischer, Nathan Coats, Danny McGloughlin, Richard Vallejo, and GuardSight’s founder, John McGloughlin! [Listen to the podcast to hear full responses to the ... Read More