Perimeter Watch

We are the experts in digital security.

Scroll to see what we do.

Insights

01

June 2, 2022

TrickBot

02

June 2, 2022

Top Ten Web Application Vulnerabilities Pt. 2

Web Applications are an attackers first choice when trying t...

03

May 3, 2022

A Switch From the Norm - A New Malware Infection Chain

Microsoft started to disable Excel 4.0 macros by default at ...

04

May 3, 2022

Fancy Bear

05

April 1, 2022

Lapsus$

A new player in the ransomware circle has continued to targe...

06

April 1, 2022

Top 10 Web Application Vulnerabilities Pt. 1

Web Application’s are an attackers first choice when trying ...

07

April 1, 2022

Suspected UNC 1151 Attacks as Ukraine Conflict Continues

08

March 2, 2022

BlackCat Ransomware

A ransomware group using Rust programming language and with ...

09

March 2, 2022

The Anatomy of a Cyber Attack

The rate of cyber-attacks has escalated exponentially in the...

010

February 2, 2022

#LeakTheAnalyst

The group responsible for hacking Mandiant analyst back in 2...

011

February 1, 2022

A New Campaign From Lazarus Group

Lazarus Group (also known by other monikers such as Zinc, HI...

012

January 3, 2022

The Return of Emotet

In early 2021, an international law enforcement operation co...

013

January 3, 2022

Introduction to Threat Modeling

The attack and defense sides of security are constantly chan...

014

December 3, 2021

Yanluowang Ransomware

015

December 13, 2021

The Downfall of REvil

One of the most infamous ransomware gangs, REvil, may have b...

016

November 3, 2021

Lockbit 2.0

While Darkside may have rebranded as BlackMatter and REvil t...

017

November 3, 2021

Do You Need an MDR Solution?

Malware and Ransomware is only getting more complex over tim...

018

August 17, 2021

BlackMatter - A Possible Successor to Darkside and REvil

After the disappearance of two of the top ransomware gangs, ...

019

August 19, 2021

Prometheus TDS – A Whole New Cybercrime Ecosystem

A new cybercrime service is being offered on the DarkWeb to ...

020

August 15, 2021

Conti Ransomware

The case for a defense in depth approach to securing our net...

021

September 23, 2021

Top 5 Endpoint Security Solutions of 2021

Data security has been a major issue for small and midsize b...

022

July 5, 2021

Five Most Wanted Ransomware Operations of 2021

The last half-decade has seen a huge increase in financially...

023

September 18, 2021

Critical Advisory: powershell_ise.exe

Severity: Critical Objective: Gain Access Tactic & Technique...