This is the second in a three-part series on third part risk management.

In 2013, hackers using a phishing campaign and a piece of malware known as Citadel broke into the systems of an HVAC company that happened to be a vendor for the retail chain Target. The attackers stole the vendor’s credentials for an internal Target webserver (thought to be used for outside vendors). From there, the attackers leveraged a vulnerability on the internal server and conducted reconnaissance – ultimately identifying point-of-sales devices that were liable to the use of an exploit the attackers had at their disposal. So, goes the story of the famed Target breach.

This is the first in a three-part series on third part risk management.

Let’s say you are getting ready to go on a long trip. You buy a new alarm system, install tamper-proof windows, and install a fancy digital lock. Finally, you consider giving a spare key to your neighbor for good measure. Now, at this point, would you give it to a neighbor who leaves his own door unlocked, has been recently robbed, or is likely careless with your key? Instinctively, you would prefer giving it to a neighbor who will keep his own home secure, is not a target for burglars, and will handle your trusted key carefully.

CYR3CON™ CyRating™ ranks CVE-2017-8759 as “Nearly Certain” 2 months before Nov. attack

CYR3CON™’s CyRating™ ranked CVE-2017-8759 as “Nearly Certain” of being exploited 2 months before the Cobalt group’s attack which occurred on November 20th. CYR3CON™ data showed hackers discussing CVE-2017-8759 in relation to Cobalt Strike, the pen testing tool that the Cobalt hacker group is named after, as early as Sept. 25.

CYR3CON identified Cobalt exploit as “Very Likely," while others predicted "Low Risk"

CYR3CON™’s early identification of the hacker group, Cobalt’s exploit as being “very likely” led the industry in providing the most advanced notice prior to the November 22nd breach. CYR3CON, a Next-Gen cyber threat intelligence firm, ranks and prioritizes vulnerabilities though its CyRating platform, combining advanced machine learning with automatically mined deepweb/darkweb information.

CYR3CON™ Finalist in PwC Cybersecurity Day 2017 International Cyber Security Competition

Phoenix, Arizona – October 12, 2017 CYR3CON™ was selected as 1 of 10 finalist in PwC Cybersecurity Day 2017 International Cyber Security Competition, focused on showcasing the innovative technologies of these fast-growing, cyber security companies in front of over 200 international executives, IT security specialists, and investors representing multinational companies and institutions from Europe and abroad.

CYR3CON™ Finalist in MD5 & Defense Entrepreneurs Forum’s Defense/Security Innovation Competition

MD5 Starts Austin

Phoenix, Arizona – September 11, 2017 CYR3CON™ was selected as 1 of 5 finalist in MD5 & Defense Entrepreneurs Forum’s MD5 Starts Austin 2017, an annual innovation competition focused on showcasing an elite group of early stage ventures who are developing products with high potential to address both critical national security problems and commercial markets.

CYR3CON™ advances as Finalist in TechConnect’s 2017 Defense Innovation Technology Challenge

Phoenix, Arizona – August 4, 2017 TechConnect has selected CYR3CON™ as a finalist in its 2017 Defense Innovation Technology Challenge for Cyber Security. CYR3CON was chosen as one of top 12 percent of finalist from a pool of approximately 800 applicants. A cyber security startup focused on providing actionable intelligence about malicious hackers, CYR3CON™ now moves on to the final oral and showcase phase of the challenge.