SCYTHE BLOG

January 18, 2019

SCYTHE: Starting 2019 with Linux and ATT&CK™

The SCYTHE team has been hard at work on our new release and we are proud to present the next major evolution of the SCYTHE Continuous Red Team Automation platform.What’s New

Read Now

January 16, 2019

Fileless Malware and the Threat of Convenience

Many of the conveniences brought via modern tools, operating systems, and applications also bring means for an adversary to execute actions while under the guise of a valid service. This is seen distinctly in the increased use of Fileless Malware.

Read Now

December 3, 2018

Paintball at the WMCAT Hub Debut

Paintball with a purpose. That was the theme for the 6th Annual Purple Event, hosted by the West Michigan Cyber Security Consortium (WMCSC) on October 10th at the West Michigan Center for Arts and Technology (WMCAT) facility. A purple-team cyber competition is unique in that it consists of teams made up of five offensive (red) and five defensive (blue) security professionals. They work together and share skills and knowledge in order to exploit, control, and secure assets within the live fire virtual cyber city, Alphaville. The “live fire” cyber security environment simulates real-life environments such as libraries, schools, city management offices, public utility facilities, residential homes, and even networked vehicles.

Read Now

October 17, 2018

The Launch of SCYTHE

When I started GRIMM, I had a vision to tackle the greatest cybersecurity challenges that face our clients, industry and the greater business and government communities. Five years later, we have grown into a dynamic and passionate team who strives to make a better, more secure world through the independent research and the services we provide to clients.

Read Now

October 16, 2018

Don’t Get Comfortable Yet - The Declining Fear of Ransomware

With the news that ransomware attacks are on the decline, in favor of crypto-mining (aka “crypto-jacking”), it is tempting to now reshuffle your enterprise’s defensive priorities based on the adversary trends. But before you retask your Blue Team to focus on researching cryptocurrency miners, let’s take a moment and remember a few key fundamental facts about ransomware, and how it is still different, and more dangerous, from its money-mining “successor”.

Read Now