New Variant of Petya / PetrWrap Ransomware Strikes

June 27, 2017 | Sacha Dawes
Sacha Dawes

Sacha Dawes

Principal Product Marketing Manager

Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space.  Originally from the UK, Sacha lives in Austin, TX.

http://alienvault.com

February 5, 2018 | Sacha Dawes

Australian Privacy Act Gets New Notification Requirements

With GDPR the focus of many press headlines across the world, you’d think it was the first and only regulation covering the privacy of individuals! However, privacy regulations exist in numerous countries around the globe, and anyone in Australia or its territories will be all-too familiar with the Australian Privacy Act 1988 (which, for simplicity, I'll just refer…

January 11, 2018 | Sacha Dawes

Improve Your Readiness To Defeat Meltdown & Spectre

You were just getting back into the swing of things after bringing in the New Year, and it happened. Like a huge firework exploding with a thump that you can feel through your body, the news of Meltdown and Spectre hit the media on January 3, 2018.Since the official disclosure of Meltdown and Spectre, there has been a flurry of news…

Get the latest security news in your inbox.

Subscribe via Email

June 27, 2017 | Sacha Dawes

New Variant of Petya / PetrWrap Ransomware Strikes

On June 27th the AlienVault Labs Team became aware of a new ransomware, a variant of the Petya malware, that is spreading rapidly and is known to have affected organizations in Russia and the Ukraine, and some other parts of Europe. A pulse detailing the Indicators of Compromise for this variant of Petya can be found in the AlienVault Open…

May 31, 2017 | Sacha Dawes

File Integrity Monitoring Solutions – What Are They and Why You Need One, Part 3

With the recent WannaCry ransomware attack still top of mind for many IT professionals worldwide, it’s an important reminder to that you should monitor not just your networks and security devices, but also data on your servers and desktops.  In the case of WannaCry, having File Integrity Monitoring (FIM) in place can enable you to detect…

May 10, 2017 | Sacha Dawes

What is File Integrity Monitoring and Why You Need It Part 2

In recent weeks, point-of-sale (POS) breaches have dominated the headlines of cyber security news. For example, just after my last blog on file integrity monitoring (FIM), news of a malware breach at InterContinental Hotels Group (IHG) hit the headlines. Unfortunately, the malware ran undetected from September through December 2016, and it took until March 2017 to get final confirmation that it was…

April 19, 2017 | Sacha Dawes

What is File Integrity Monitoring and Why You Need It

The news is rife with stories of successful attacks against servers, point-of-sale (POS) systems, IoT devices and more where an attacker has gained access to an organization’s IT assets and changed or inserted new files and data to do something malicious. Just a search on malware highlights a seemingly-endless list of variants including the recent exposure of NSA-backed…

Watch a Demo ›
GET PRICE FREE TRIAL