Eyal Aharoni

Your Own Red Army

Don’t See Red - Opt for an Automated Red Team to Test Your Security Defenses For some time now, companies have copied a proven military concept to test their cybersecurity. This concept is simple: A Red Team consisting of cybersecurity pros attacking the organization’s network and the Blue Team[...]

Game of Ransomware

The Four Horsemen of The Ransomware Apocalypse Keep Riding On Optimistic souls predicted last year that ransomware attacks had their heyday in 2017, so that we would see a decline in 2018. Bad news - this is not the case…The four horsemen of the ransomware apocalypse keep on riding, just changing[...]

Cyber Slingshot Away!

Coming to a router near you - beware of Slingshot malware! Cybercrooks and cyberspooks never sleep, and their new “creations” keep popping up. One of the recent trends is targeting routers to cyberattack. Recently, the routers of Latvian manufacturer MikroTik were attacked in a highly sophisticated[...]

Tidal Waves in The Cybercrime Ocean

The Rising Costs of Cybercrime - Guess Who Pays The Ferryman? Over the last few years, cybercrime and espionage have caused damages that have reached $600 billion in 2017, which is about 0.8% of global GDP. This is a substantial increase from $445 billion in damages that was reported in 2014. Guess[...]

Russia Blamed for Petya/NotPetya

Five Eyes Nations Peg Russia as the Brains behind Petya/NotPetya Remember Petya and NotPetya? Quick reminder: The initial version of the ucial infrastructure including its central bank, airport, metro transport, and even the Chernobyl power plant. The hackers used the Ukrainian accounting program[...]

It's 2018 and Cyber Attacks Using Email Haven’t Gone Away  

Bad News - Attackers Are Launching Email Based Cyber Attacks As Never Before Just as in 2016 and 2017, cyber criminals, malicious hackers and nations keep on targeting email inboxes this year. Corporate email accounts have always been a favorable target and according to security experts, the BEC[...]

Hacking The 2018 Winter Olympics

The Olympic Destroyer Hacks The Winter Olympics 2018 Swiping Files (Not Medals) In total, 91 national teams participated in the Winter Olympics 2018. The Olympians were not the only stars, major companies such as Samsung and Intel showed off with self-driving cars, virtual-reality viewing stations[...]

Iran’s Continuous Cyberwarfare Efforts

Since my previous post on the matter dated November 2nd 2017, Iran keeps on waging its cyberwarfare against its neighbors and (sadly enough) also its citizens. The increasing number of attacks launched by hackers backed by the Iranian regime and its proxies has shown a mix of sophisticated as well[...]

Another Fake Invoice Phishing Scam to the Bin

The fake invoice phishing scam has been around for quite some time and it pops in the wild every once in a while, in a different form. Overall, the nature of all those scams are in the end the same - a clever con to defraud victims.

Will 2018 be the year of critical infrastructure cyberattacks?

For some time now, authorities have been worried that their critical infrastructure will be shut down or severely compromised. Some institutions experience thousands of attempted attacks on a daily basis by hackers, cyber criminals and rival nations. According to the US Department of HLS,[...]