Nick-Hyatt

Nick Hyatt

Senior Consultant

Nick Hyatt is a senior consultant with Optiv’s enterprise incident management practice. In this role, he specializes in incident response, threat hunting and digital and malware forensics.

 

Petya / Petna / NotPetya Ransomware Recommendations from the Trenches

· By Nick Hyatt ·

Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats, including WannaCry. In the wake of yesterday’s Petya attack, I thought it would be prudent to update that blog again and reinforce concepts discussed therein.

Continue reading

WannaCry Ransomware Recommendations from the Trenches

· By Nick Hyatt ·

Approximately one year ago, I wrote a blog post containing actionable recommendations to protect your environment from ransomware threats. In the wake of the recent WannaCry attack, I thought it would be prudent to update that blog and talk about what concepts have both changed and remained the same in the world of ransomware during the previous year.

Continue reading

Ransomware Kill Chain and Controls - Part 2: Once the Crying is Over, the Controls Must Kick In

· By James Robinson, Nick Hyatt ·

In the first part of the blog series, we alluded to the impending danger of ransomware campaigns. It appears the concerns were justified, given the size of the most recent cyber attack that hit countries worldwide on May 12. The WannaCry ransomware program, also called WannaCrypt, WanaCrypt0r and Wanna Decryptor, was launched by a group of cyber criminals causing computers in more than 100 countries to lock up and be held for ransom.

Continue reading

Ransomware Part 3: Recommendations from the Trenches

· By Nick Hyatt ·

In the first two parts of this blog series we explored both a high-level overview of dealing with the ransomware epidemic and an in-depth look at how different strains of ransomware can infect your network. In this post we examine actionable recommendations to protect your environment from ransomware threats.

Continue reading
(4 Results)