Happy Birthday to the U.S. Army! NexThreat is Proud to support the Army through our work at INSCOM.
NexThreat
Computer and Network Security
Alexandria, VA 1,684 followers
Data. Intelligence. Action.
About us
NexThreat, an 8a, SDVOSB, and HUBZone company is headquartered in Alexandria, VA, and is an innovative provider of Threat Detection and Advanced Analytics to IC, DOD, and FedCiv organizations.
- Website
-
https://www.nexthreat.com
External link for NexThreat
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Alexandria, VA
- Type
- Privately Held
- Founded
- 2016
- Specialties
- SIEM, Insider Threat, ArcSight, Splunk, Compliance, SOC, Qradar, Detection, NetWitness, Securonix, Use Cases, and Business Analytics
Locations
-
Primary
7686 Richmond Hwy
Suite 116
Alexandria, VA 22306, US
Employees at NexThreat
-
Ruben Gavilan
CEO @ NexThreat | Cryptologist | Insider Threat & Algorithmic Warfare SME | Navy Veteran
-
Yulia Senkiv
Director of Recruiting at NexThreat
-
Daniel Gavilan
COO - Director of Business Development - Based in Alexandria, VA - SDVOSB - 8(a) - HUBZone - TS SCI FCL
-
Demar Jurado
Business Development Associate
Updates
-
NexThreat will be attending tonight's GovMates networking event!
Today's the day! Beer, BBQ, & GovCon Buddies (Networking) at our Sold Out Prime Another Day Networking Event. Didn't get a ticket to this one but still want to get that govmates goodness? Join us for our July govmates Institute (YES! The Institute is BACK). July 23rd we're hosting a half day education session on AI | The Wild West! https://lnkd.in/e8iTH3sQ
-
🎄 Happy Holidays from NexThreat! 🎄 As we gather for the holidays, we reflect on how Data, like the threads of a festive tapestry, weaves together the stories that drive our cybersecurity efforts, particularly in insider threat detection. As we enjoy the holiday lights, we're reminded of the brightness of Intelligence in our field. It's the beacon that guides our strategies and innovations. Heading into the new year, we embrace Action. Together, we'll continue to safeguard our Nation's digital realms with proactive measures and steadfast dedication. Happy Holidays and a proactive New Year to all our clients and business partners! 🌟 NexThreat 🌟 Data. Intelligence. Action #cybersecurity #NexThreat #happyholidays #threatintelligence
-
NexThreat reposted this
COO - Director of Business Development - Based in Alexandria, VA - SDVOSB - 8(a) - HUBZone - TS SCI FCL
I will be attending the Defense Intelligence Agency's DoDIIS Worldwide Conference in Portland, Oregon December 12th-14th! If you will also be in attendance, let's connect!
-
This Thanksgiving, we at NexThreat pause to express our deep gratitude to our valued government customers, teaming partners, and dedicated team members. Your unwavering trust and collaboration are the pillars of our success as a small business. Today we reflect on what binds us together: a commitment to Data accuracy, the pursuit of Intelligence in cybersecurity, and the drive for decisive Action. These principles are not just our slogan; they are the bedrock of our collective efforts to safeguard our nation's digital frontiers. NexThreat is thankful for the opportunity to work alongside each of you, contributing to a world where Data, Intelligence, and Action converge to create a safer, more secure digital environment. Your support and partnership amplify our impact and drive us forward. We wish you all a Thanksgiving filled with Joy, Peace, and the Warmth of family and friends. May this holiday offer you well-deserved rest, moments to cherish, and the opportunity to reflect on the values we hold dear in our professional endeavors. Happy Thanksgiving from all of us at NexThreat, where Data, Intelligence, and Action are not just words, but a commitment to excellence.
-
Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities. Check Point, which detailed Gamaredon's (aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder) latest tactics, branded the group as engaging in large-scale campaigns that are followed by "data collection efforts aimed at specific targets, whose selection is likely motivated by espionage goals." The LitterDrifter worm packs in two main features: automatically spreading the malware via connected USB drives as well as communicating with the threat actor's command-and-control (C&C) servers. It's also suspected to be an evolution of a PowerShell-based USB worm that was previously disclosed by Symantec in June 2023. Written in VBS, the spreader module is responsible for distributing the worm as a hidden file in a USB drive together with a decoy LNK that's assigned random names. The malware gets its name LitterDrifter owing to the fact that the initial orchestration component is named "trash.dll." #nexthreat #russia #ukraine #usb #littledrifter #worm #powershell #symatec
Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks
thehackernews.com
-
An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade. The Appin Software Security (aka Appin Security Group), according to an in-depth analysis from SentinelOne, began as an educational startup offering offensive security training programs, while carrying out covert hacking operations since at least 2009. #nexthreat #appin #unitedstates #china #india #myanmar #pakistan #kuwait #hackforhire
Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years
thehackernews.com
-
The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox. #nexthreat #lumma #malware #ransomware #trigonometry
Lumma Stealer malware now uses trigonometry to evade detection
bleepingcomputer.com
-
The ALPHV/BlackCat ransomware operation has taken extortion to a new level by filing a U.S. Securities and Exchange Commission complaint against one of their alleged victims for not complying with the four-day rule to disclose a cyberattack. Earlier today, the threat actor listed the software company MeridianLink on their data leak with a threat that they would leak allegedly stolen data unless a ransom is paid in 24 hours. #nexthreat #alphv #blackcat #ransomware #ransomwareattack #sec #securitiesandexchangecommission #disclosure #merdianlink #databreach
Ransomware gang files SEC complaint over victim’s undisclosed breach
bleepingcomputer.com