SpyCloud Launched SpyCloud Labs to Disrupt Cybercrime with Research

SpyCloud, the leader in Cybercrime Analytics, recently  announced the launch of SpyCloud Labs, a targeted cybercrime research effort focused on uncovering and analyzing the digital underground to proactively disrupt cybercrime.

With the launch of SpyCloud Labs, the larger security community will have a window into the insights SpyCloud analysts gather about the intricacies of the underground criminal ecosystem – including findings gained from reverse-engineering emerging malware families that infect business systems and open the doors to follow-on attacks like ransomware.

In addition to driving the analysis and data behind SpyCloud’s industry-leading products, SpyCloud Labs’ cybercrime analysts and researchers will produce and publish innovative research on the SpyCloud website and share findings in webinars, industry events, and conferences.

SpyCloud’s unique process for recapturing breaches and malware-exfiltrated data means that SpyCloud Labs is able to analyze threat actor behavior and surface little-known and newly emerging patterns in threat activity based on real data – as it’s happening.

“The scale of criminal activity we’re seeing today is mind-boggling and growing at an alarming rate. The purpose of SpyCloud Labs is to relentlessly analyze the active tactics we’re seeing among cybercriminals and look ahead in the evolution of these practices.

The work being done within SpyCloud Labs is a real game-changer within the security industry and provides enterprises with the tools they need to protect themselves today.“Damon Fleury, Chief Product Officer at SpyCloud

The launch of SpyCloud Labs comes as threat actors increasingly leverage infostealer malware like LummaC2 and Atomic Stealer to improve their tactics and drastically broaden attack success. In the near-term, SpyCloud Labs is positioned to heavily focus on the rise of malware threats, but remains agile to pivot and expand its focus in tandem with evolving cybercriminal behavior.

 

(Image courtesy: www.IEEEcomputersociety.com)

Leave a Reply

Your email address will not be published. Required fields are marked *