Return Of Bleichenbacher Oracle Threat [ROBOT] ROBOT – Return Of Bleichenbacher Oracle Threat, is an attack model based on Daniel Bleichenbacher chosen-ciphertext attack. Bleichenbacher discovered an adaptive-chosen ciphertext attack against protocols using RSA, he demonstrated the ability to perform RSA private-key operations. Researchers have been able to exploit the same vulnerability with small variations to the Bleichenbacher attack. […]
6 ways the GDPR will affect VAR Sales People We all know the inevitable GDPR is approaching and whilst organisations prepare for the incoming legislation, many haven’t considered its effects on daily operations, particularly for Value Added Resellers within the IT security channel. Here we’ve collated the 6 most significant changes which we expect […]
Bad Rabbit ransomware outbreak Organizations in Russia and Ukraine were under siege on Tuesday 24 October 2017 from Bad Rabbit, a strain of ransomware with similarities to NotPetya. By evening, the outbreak was reportedly spreading into Europe, including Turkey and Germany. Victims reported so far include airports, train stations and news agencies. Russia’s Interfax news agency reported on Twitter that […]
Bad Rabbit – Ransomware A new ransomware campaign has affected at least three Russian media companies in a fast-spreading malware attack. Fontanka and Interfax are among the companies affected by the Bad Rabbit ransomware named by the researchers who first discovered it. The malware is delivered as fake Flash installer, it uses the SMB protocol to check hardcoded […]
Get a Single View of WAF Events with the Imperva AppSecurity View App for Splunk Enterprise Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. A compilation of analyst predictions by SecureWorks, shows that the cloud continues to gain momentum as organizations embrace […]
Generations of Machine Learning in Cybersecurity A new white paper is available from our Data Science team on machine learning. Snag your copy today! In this white paper, we aim to define generations of machine learning and to explain the maturity levels of artificial intelligence and machine learning that are being applied to cybersecurity […]
IDENTITY & ACCESS MANAGEMENT THAT PREPARES YOUR BUSINESS FOR TAKEOFF With 63% of confirmed data breaches* involving weak, default or stolen passwords, identity has become the most consequential attack vector organisations are facing today. As organisations embrace cloud, mobile and web applications, the attack surface increases as does the probability that a single compromised identity […]
What’s Next for Ransomware: Data Corruption, Exfiltration and Disruption
As I’m sure you have all seen, the latest news reports of a new Petya-like global attack is spreading fast. The attack uses the NSA’s External Blue exploit involved in last months WannaCry outbreak. The details of how the malware is behaving is still developing but what’s been found so far is the ransomware primarily […]
What we know so far: Petrwrap/PetyaWrap seems to be very similar to a less prevalent variant of ransomware that was seen last year, called GoldenEye. Specifically, they both vary slightly to other more common ransomware, in that they target the master boot record of the OS rather than individual files. This renders the machine fairly […]
The Blue Cube ethos is to offer fully independent and accurate advice providing the expertise, technology and management skills to help identify where to protect, what to protect and how to protect corporate IT resources and enable secure access for authorised users.
Blue Cube Security Ltd.
0345 094 3070
©2017 BLUE CUBE SECURITY LTD. ALL RIGHTS RESERVED.