Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

Tackling An Unpatchable Vulnerability With Bromium

In a recent cybersecurity training course with Police Scotland, I asked the group what I thought was a slightly sneaky question "what does every organisation in the world have in common?". After a few technical answers along the lines of computers, internet, servers and others, one of the class simply said, people. “People” was the answer I was looking for and for the next 30 mins, we discussed how much of a pain people are when it comes to cybersecurity.

Read More

The Importance of End User Awareness

With GDPR less than a year away, are we all preparing as best we can? GDPR shouldn't be mentioned with the tone of it only affecting members of board, CIO's/CTO's/controllers and processors. When we talk about GDPR - we should be looking at both ends of the spectrum. End users play a huge part in the general data protection regulation cycle.

Read More

NHS Needs “Massive” Investment In Cybersecurity Warn Experts

Early May NHS bosses and government faced questions over why their hospitals were left vulnerable to global cyber-attack “wannacry”. NHS faced days of disarray after the attackers demanding a ransom intruded the health services computer systems.

Read More

Variants OF Petya Ransomware Spreading With EternalBlue

It has been reported that variants of Petya ransomware with worm-like capabilities is spreading. The ransomware leverages etenalblue exploit, genuine psexec or wmic with appropriate credentials for a quick spread.

Read More

Ransomware... One More Time

Following on from the previous blog “Carbon Black (CB) “More on WannaCry” I thought it would be a good idea to go over Ransomware and list some key information surrounding this type of malware. (Would have been an idea to write this before the last blog but needs must be met when everyone is talking about one specific type) So for you guys that are still unsure how Ransomware works here goes. (Warning: This maybe too basic for most but awareness is key ☺)

Read More

Useful Steps To Avoid The Ransomware Attacks Within A Production Environment

This blog takes us through some simple steps suggested by one of the leading cyber-security firms to escape ransomware attacks

Read More

QRadar Technical Blog: Using QRadar to check for WCry

After the events of the last few weeks you might wish to protect your network against a second invasion of the WannaCry malware. By all accounts the next instance may well be nastier than the first.

Read More

Five Valuable Tips to Take-Away For Ransomware Protection

The way that WannaCry spreads is by SMB using a vulnerability found within Microsoft Windows. Microsoft addressed the vulnerabiolity by releasing a new patch with the reference name of MS17-010 back in March. Organisations still had not updated their systems, and therefore had been exploited via the weakness in their defences. Once it infects the network, WannaCry encrypts all files it has access to and attempts to delete all shadow copies, making affected files even more difficult to recover.

Read More

Carbon Black (CB) "More on WannaCry"

Continuing from the last blog, Carbon Black Defense “Put to the test”. Most of the world has heard or experienced WannaCry.

Read More

Eternal Rocks To Use Seven Exploits in Comparison to WannaCry's Two

Cybersecurity researchers have discovered a new exploit which uses seven of the NSA’s leaked exploits. “EternalRocks”, a new malware, uses the exploits first discovered by the National security agency, experts are describing this malware as “doomsday” which can strike anytime.

Read More

WannaCry – Ransomware explosion hits hundreds of companies around the world

By now, we’ve all heard of the events of Friday 12th May. One of the largest, highly-profiled ransomware attacks struck the NHS and other organisations, but few are probably aware of the scale of the assault. Targets were also attacked in Spain, Brazil, Russia, India, China and throughout EMEA – this attack hit hard throughout the world.

Read More

10 Steps To An Effective Ransomware Protection Strategy

In light of the recent widespread takedown of NHS systems by Wanna Decryptor 2 ransomware, at the forefront of many CISO’s thoughts this weekend will be how to protect their enterprise data against falling foul of the many varieties of ransomware available in the wild.

Read More

New Year, New SPORA

A new form of ransomware has been detected on the security radar. It is known as SPORA, and as devastating as it is, it has some notable developed features that are quite impressive.

Read More

New Manoeuvres to Deliver Ransomware and Avoid Anti-Virus Detections

In the modern age, groups of anonymous hackers are utilising new tactics to deliver and compromise remote target systems. The traditional system of using email attachments as a way to distribute these tactics is still being widely used, and considered to be the main way of targeting victims.

Read More

How Ransomware Works

Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and steals valuable information, ransomware doesn’t hide. As soon as ransomware has locked a user’s machine and/or encrypted files, it notifies the user of its presence to make the ransom demand.

Read More

Frequent & Dangerous: Discover Seven Cyberattacks You Will Face Sooner Or Later

“Cybercriminals to compromise company: business loses $56 million.” Do you find this headline familiar? Such front-page news and analysis of large-scale attacks hit us every day. Read more on why Prevention just isn't enough

Read More

Website offline? New server-focused FAIRWARE Ransomware could be why

In a time of non-stop news stories about ransomware, a new variant called FAIRWARE is attacking Linux-based servers running web sites.

Read More

Protect against CryptoLocker Ransomware

Recently, attackers employing a CryptoLocker variant have been removing volume shadow copies on systems, disallowing the users from restoring those files and then encrypting the files for ransom. If a user cannot recover from backups, he/she is at the attacker’s mercy.

Read More

How to take control of the ransomware problem

When will we be finally rid of ransomware? I imagine CISOs up and down the land repeat the same question most every day. Because it’s on a near daily basis we hear of yet another new variant causing havoc around the world. Most recently, reports have focused on new strains being offered “as-a-service” for non-technical cybercriminals to disseminate, ensuring the outbreak has now reached epidemic proportions. The truth is that until all organisations start refusing to pay the ransom, and/or get better at security basics, there’ll always be enough profit to keep the black hats interested.

Read More