Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

Deception

Snake Ransomware – Catch & Kill With Cyber Deception

12th June 2020 peterglock

Our technology partner Smokescreen has produced a handy guide on how to use deception to find and kill ransomware:

 Deception

Free Trial: Private Threat Intelligence

5th June 20205th June 2020 peterglock

Following on from our webinar with Sahir Hidayatullah, CEO of Smokescreen Technologies, we’re delighted to be able to offer a 1 month free trial of Private Threat Intelligence (PTI) using the […]

 Deception, Free Trial  Threat Intelligence

Recent Posts

  • New Linux, macOS malware hidden in fake Browserify NPM package
  • Capcom: Ransomware gang used old VPN device to breach the network
  • The Locked Shields exercise will place as much focus on grey zone activities as it will on the …
  • FBI nuked web shells from hacked Exchange Servers without telling owners
  • Microsoft Patch Tuesday, April 2021 Edition

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

VAT No: EE102351110

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

12 hours ago

Glock Enterprises Ltd
buff.ly/3a8DektCapcom: Ransomware gang used old VPN device to breach the networkDo you include your backup facilities in your threat modelling and pen test exercises?...:Capcom has released a new update about the ransomware attack it suffered last year, detailing how the hackers gained access to the network, compromised devices, and stole personal information belonging to thousands of individuals.[...]Investigators discovered that Ragnar Locker operators gained access to Capcom’s internal network by targeting an old VPN backup device located at the company’s North American subsidiary in California.[...]Original Article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes