Vertek’s OTX Public and Private Pulses provide a summary of the threat, some information regarding the software targeted, and the related indicators of compromise (IoC) that can be used to detect threats. Vertek utilizes several methods and various tools to obtain IoCs we feed into our Pulses. Please test accordingly and use at your own discretion. IoCs types include IP addresses Domains Hostnames (subdomains) Email URL URI File Hashes: MD5, SHA1, SHA256, PEHASH, IMPHASH......
As most of you have likely heard or seen on the news, there’s a new ransomware variant called “WannaCry”...Read More
While it may seem that no network is safe from the dreaded data breach, Managed Threat Intelligence, a business...Read More