24x7 Systems Monitoring
IT Support & Consulting
IT Equipment Leasing
Our Security Alliance
Enter the new era of threat prevention
Antivirus vendors even admit a different approach is needed to stop unknown attacks. But trying to stay just a step ahead is not enough to stop sophisticated attacks.
SentinelOne’s next-generation endpoint and server protection uses several layers of attack prevention, including behavior detection and machine learning, to stop attacks that other vendors simply can’t. It also provides unparalleled threat visibility at a minimum system impact.
Why Choose VirtualStrike?
- Establish value by implementing Enterprise IT solutions
- Enhance company efficiency and productivity leading to increased profitability
- Reduce security risks by monitoring infrastructure health
- Proactively manage your infrastructure to resolve and prevent issues as they develop
- We’re here to help. As an extension of your office, we provide comprehensive help desk support to exceed the expectations of your office needs.
- We have the highest rated security team in the industry, monitoring and resolving threats 24x7x365
Let’s Discuss Your Needs
Latest Cyber Security News
Misuse of Alphabet’s Virus Scanner is Exposing Sensitive Files
on October 21, 2019 at 8:15 am
Russian hackers cloak attacks using Iranian group
on October 21, 2019 at 7:45 am
Image copyright Getty Images Image caption Iranian hackers became unwitting dupes for Russian attacks An Iranian hacking group was itself hacked by a Russian group to spy on multiple countries, UK and US intelligence agencies have revealed. The Iranian group - codenamed OilRig - had its operations compromised by a Russian-based group known as Turla. The NCSC discovered that the attack on the institution had been carried out by the Russian Turla group, which it realised was scanning for capabilities and tools used by Iran-based OilRig. In an investigation that lasted months, it became clear the Russian group had targeted the Iranian-based group and then used its tools and access to collect data and compromise further systems. The NCSC would also not directly attribute the attacks to the Russian and Iranian states but Turla has previously been linked by others to Russia's Security Service, the FSB, and OilRig to the Iranian state.
Tools and Tactics of the Sodinokibi Ransomware Distributors
on October 21, 2019 at 7:30 am
Using a network of honeypots, researchers from McAfee examined the tools and tactics used by the Sodinokibi Ransomware (REvil) affiliates to infect their victims with ransomware and compromise other machines on the network. As part of the Sodinokibi ransomware-as-a-service, ransomware executables are tagged with an affiliate's IDs and sub IDs in order to track who infected the victim and which affiliate should earn a commission for a payment. These affiliates, known as Group 1, affiliate #34, and affiliate #19, all initially compromised a system via RDP and then use this foothold to try and compromise the rest of the network. The individual is sharing information related to Masscan and Kport scan results for specific countries that can be used for brute force operations." Everything search engine deployed to index documents An interesting program that was deployed by affiliate #34 is the Everything file indexing software.
Cold War mentality hindering mutual trust in cyberspace, says Beijing
on October 21, 2019 at 7:00 am
WUZHEN • A "Cold War mentality" and "bully behaviour" are hindering mutual trust in cyberspace, China's propaganda chief said yesterday at the start of the World Internet Conference in the eastern Chinese town of Wuzhen. Mr Huang Kunming, head of the publicity department of China's ruling Communist Party, also said that under the pretext of national security, some countries have launched cyber attacks on other countries and enterprises. "By using national security as an excuse, some countries have attacked some countries and enterprises. This has increased the uncertainty, opposition and negativity in cyberspace." The state-run World Internet Conference, one of China's most prominent tech events, takes place this year against a backdrop of rising United States-China tensions that has especially overshadowed the tech sector. China has also been pushing for a bigger role in global Internet governance and has called on nations to respect its "cyber sovereignty", the idea that countries should be free to control and censor their Internet infrastructure as they see fit.
Alexa and Google Home devices leveraged to phish and eavesdrop on users, again
on October 21, 2019 at 6:45 am
Hackers can abuse Amazon Alexa and Google Home smart assistants to eavesdrop on user conversations without users' knowledge, or trick users into handing over sensitive information. Security researchers have previously found similar phishing and eavesdropping vectors impacting Amazon Alexa in April 2018; Alexa and Google Home devices in May 2018; and again Alexa devices in August 2018. Both the phishing and eavesdropping vectors are exploitable via the backend that Amazon and Google provide to developers of Alexa or Google Home custom apps. (U+D801, dot, space) character sequence to various locations inside the backend of a normal Alexa/Google Home app, they could induce long periods of silence during which the assistant remains active. to induce a long pause, and then prompt the user with the phishing message after a few minutes, tricking the target into believing the phishing message has nothing to do with the previous app with which they just interacted. Both of these attacks exploit the fact that while Amazon and Google verify and vet Alexa and Google Home apps when they are submitted, they do not do the same for subsequent app updates.