Fellow, Team Cymru
David has been with Team Cymru since 2007. Prior, he served in the US Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team Cymru, he has been an engineering leader a Community Services team member, and a security analyst. David led efforts to secure the firm’s intelligence infrastructure and established processes the firm relies on today. Currently, David assists CSIRT teams worldwide and fosters data sharing partnerships.
Preparing for Shift Left - GovInfoSecurity govinfosecurity.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from govinfosecurity.com Daily Mail and Mail on Sunday newspapers.
Fellow, Team Cymru
David has been with Team Cymru since 2007. Prior, he served in the US Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team Cymru, he has been an engineering leader a Community Services team member, and a security analyst. David led efforts to secure the firm’s intelligence infrastructure and established processes the firm relies on today. Currently, David assists CSIRT teams worldwide and fosters data sharing partnerships.
Fellow, Team Cymru
David has been with Team Cymru since 2007. Prior, he served in the US Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team Cymru, he has been an engineering leader a Community Services team member, and a security analyst. David led efforts to secure the firm’s intelligence infrastructure and established processes the firm relies on today. Currently, David assists CSIRT teams worldwide and fosters data sharing partnerships.
Get Permission
The Cybersecurity and Infrastructure Security Agency has issued an alert providing more details on the threat posed by FiveHands ransomware attacks.
The CISA alert, which follows one issued last week by FireEye s Mandiant research team, describes the ransomware gang s methods and offers risk mitigation tips. Threat actors used publicly available penetration testing and exploitation tools, FiveHands ransomware and the SombRAT remote access Trojan, to steal information, obfuscate files and demand a ransom from the victim organization, CISA says. Additionally, the threat actors used publicly available tools for network discovery and credential access.
Series of Attacks
FireEye said it observed an attack group using FiveHands in extortion incidents during January and February. The group has mainly targeted small and midsized businesses in telecommunications, healthcare, construction, engineering, food and beverage, education, real estate and other sectors, the