Blog & Industry News

RedWolf works with your organization’s team globally to elevate skills, increase understanding of their cyber defenses that improves their cyber defense capability over time. Keep up to date with their innovative defense platform news on the blog.

September 14, 2017

Managed Testing Explained

Q: How long does it take to schedule a test? ALWAYS AVAILABLE 24/7: Self Serve Tests SCHEDULING REDWOLF MANAGED TESTS: Immediately if resources available. Normal is two weeks.  If test design / recon / etc… is necessary two to three weeks is recommended. Try to get on a calendar as soon as possible. Weekends are Read More

August 15, 2017

RedWolf Technical Details

Q: Can a Virtual Machine be provided to be used as a target for the testing? YES. RedWolf offers a downloadable VMware virtual machine ‘agent’ that can be used in local networks (typically labs) to generate traffic. Even though these agents are local they are still controlled from the same ‘control.redwolfsecurity.com’ portal.   The amount Read More

July 30, 2017

DDoS Testing – Common Questions

Q: What are the benefits of DDoS testing? • Demonstrable capability • Improve Operational Performance • Optimize configuration • Extract full value of infrastructure and services • Manage 3rd party risk • Confirm technical controls • Confirm SLA’s • Keep up to date with emerging threats Q: How can DDoS testing be done safely? RedWolf Read More

June 2, 2017

Terror Exploit Kit Evolves Into Larger Threat

The Terror exploit kit has matured into a greater threat and carefully crafts attacks based on a user’s browser environment. Read More

EternalBlue Exploit Spreading Gh0st RAT, Nitol

FireEye said threat actors are using the NSA’s EternalBlue exploit of the same Microsoft SMBv1 vulnerability as WannaCry to spread Nitol and Gh0st RAT. Read More

Fireball Malware Infects 250 Million Computers Worldwide

A massive malware campaign has already infected 250 million Windows and Mac OS computers worldwide. Read More

Rash Of Phishing Attacks Use HTTPS To Con Victims

Phishing sites are deploying freely available TLS certificates in order to dupe victims into thinking they’re visiting a safe site. Read More

Keybase Extension Brings End-to-End Encrypted Chat To Twitter, Reddit, GitHub

A recently released extension for Chrome, developed by the public key crypto database Keybase, brought end-to-end encrypted messaging to several apps this week. Read More

Password Breaches Fueling Booming Credential Stuffing Business

The market for automated credential stuffing tools is growing fast, because of a record number of breaches. Read More