Blog & Industry News

RedWolf works with your organization’s team globally to elevate skills, increase understanding of their cyber defenses that improves their cyber defense capability over time. Keep up to date with their innovative defense platform news on the blog.

Fireball Malware Infects 250 Million Computers Worldwide

A massive malware campaign has already infected 250 million Windows and Mac OS computers worldwide. Read More

Rash Of Phishing Attacks Use HTTPS To Con Victims

Phishing sites are deploying freely available TLS certificates in order to dupe victims into thinking they’re visiting a safe site. Read More

Keybase Extension Brings End-to-End Encrypted Chat To Twitter, Reddit, GitHub

A recently released extension for Chrome, developed by the public key crypto database Keybase, brought end-to-end encrypted messaging to several apps this week. Read More

Password Breaches Fueling Booming Credential Stuffing Business

The market for automated credential stuffing tools is growing fast, because of a record number of breaches. Read More

Trump’s Cybersecurity Boss Talks Priorities

The country’s top cybersecurity boss said the country is headed the wrong way when it comes to cybersecurity. Read More

Terror Exploit Kit Evolves Into Larger Threat

The Terror exploit kit has matured into a greater threat and carefully crafts attacks based on a user’s browser environment. Read More

EternalBlue Exploit Spreading Gh0st RAT, Nitol

FireEye said threat actors are using the NSA’s EternalBlue exploit of the same Microsoft SMBv1 vulnerability as WannaCry to spread Nitol and Gh0st RAT. Read More

SSH Configuration on Nexpose Servers Allowed Weak Encryption Algorithms

Rapid7 warned this week that its Nexpose appliances were shipped with a SSH configuration that could have let obsolete algorithms be used for key exchange. Read More

WikiLeaks Dumps CIA Patient Zero Windows Implant

Pandemic is a Windows implant built by the CIA that turns file servers into Patient Zero on a local network, infecting machines requesting files with Trojanized replacements. Read More