3 min read
Charting Your Path in Cybersecurity by Uncovering Your Core Focus & Interests
Thinking about a career in cybersecurity? Use this practical guide to identify which path to take
For immediate assistance with a network intrusion, ransomware
attack, or BEC, please contact: IrongateResponse@irongatesecurity.com
The adversaries deploying chaos ransomware have recently gained initial access to corporate networks by spoofing Microsoft Teams calls. The threat group has been observed to call potential victims via MS Teams from a spoofed email and once connected, the adversary represents they are from the helpdesk. The adversary’s intention is to socially engineer the victim to screen share via Teams and allow control enabling the adversary to download and install malware on the victim’s computer. Once the malware is installed, the adversary disconnects, only to return through their malware and deploy ransomware to the corporate network.
Notable Observations:
Mitigation Recommendations:
Contact us today to learn more about our Digital Forensics and Incident Response (DFIR) services.
![]() |
Steve Ramey has spent the past two decades helping clients protect, investigate, and respond to events involving their digital interests. |
3 min read
Thinking about a career in cybersecurity? Use this practical guide to identify which path to take
3 min read
In the vast and ever-changing cybersecurity landscape, there is a place for every kind of talent. By focusing on your chosen track, you'll not only...
1 min read
October 24, 2023 IronGate CEO Steve Ramey a Featured Speaker at The QA Financial E-commerce Forum in New York