• Facebook
  • Twitter
  • Google
  • RSS
Green Sentries
  • Services
    • Threat management
      • 24/7 Security Monitoring and Threat detection
      • 24/7 Incident response
      • Managed On-premise SIEM
      • Log management and Retention
      • Global Threat Intelligence Feeds
      • Host Intrusion Detection System
      • Network Intrusion Detection System
      • User Behavior Analytics
      • Forensic Analysis Platform and Services
    • Vulnerability Management
      • Vulnerability Assessment
      • Penetration Testing
      • Web Application Testing
      • Mobile Application testing
      • IOT and ICS Penetration Testing
      • Secure Code Review
      • Security Architecture review
      • Current State assessments
    • Compliance Management
      • PCI DSS, ISO 27001, NESA, DISR Compliance Monitoring Dashboards
      • Risk Assessments
      • Compliance Consulting &Managed Compliance services
    • Managed Security Devices
      • Managed UTM, Firewall, IPS/IDS and WAF
      • Managed Security Applications
      • Managed SIEM
  • Products
    • Splunk Security Products
      • Splunk Enterprise Security
  • Partners
    • Partnership Overview
    • Become a Partner
  • Company
    • Our Story
    • News and Events
    • Careers
    • Contact us
  • Blog
Select Page

Is Petya deadlier than WannaCry?

by Tijo Davis | Aug 24, 2017 | Malware, Petya / NotPetya, Ransomware, Wannacry

In May 2017, malware outbreak such as WannaCry and Petya / NotPetya infected both enterprises and individuals across the globe. All data on the infected system were encrypted and the demanded ransom was $300 for the decryption key. Within a day, this outbreak was...

Ransomware: All you need to know about Wannacry

by Arun Thomas | Aug 1, 2017 | Ransomware, Wannacry

The first ever known ransomware was dubbed the AIDS Trojan that infected floppy diskettes. The diskettes that contained AIDS virus, counted the program number of times the computer rebooted. The AIDS Trojan cyber attackers demanded $189.00 to decrypt the files....

Recent Posts

  • CrowdStrike Falcon Search Engine
  • Social Engineering Penetration Testing – Part II (Attack Vectors)
  • Mobile Application Penetration Testing
  • Social Engineering Penetration Testing – Part I (Attack Cycle)
  • DNA HACK

Recent Comments

  • Gurram Ramesh on Need for effective SOC/Security monitoring from PCI DSS perspective – Part 2
  • Rijo Robert on Ransomware: How To Protect Yourself

Archives

  • November 2017
  • September 2017
  • August 2017
  • July 2017

Categories

  • Android
  • Automation
  • Conference
  • CouchPotato
  • CTI
  • Cyber Attacks
  • Cyber Security
  • ffmpeg
  • Forensics
  • Hacking Tool
  • IOT
  • IOT Security
  • Malware
  • Petya / NotPetya
  • Point-of-Sale (POS) Systems
  • Protocol
  • Ransomware
  • RSTP
  • Security Analytics
  • SIEM
  • Smart Phone
  • SOC
  • Social Engineering
  • Splunk
  • Vulnerability Assessment and Penetration Testing
  • Wannacry

Services

  • Compliance Management
  • Managed Security Devices
  • Threat management
  • Vulnerability Management

Products

  • Splunk Security Products
  • GreenSentry Security Appliance

Partners

  • Become a Partner
  • Partnership Overview

Company

  • Our Story
  • News and Events
  • Careers
  • Contact us

Support

  • Whitepapers
  • Blog
  • Downloads
  • Contact Support
  • Facebook
  • Twitter
  • Google
  • RSS
Copyright 2017 GreenSentries | All Right Reserved.