Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Evasive Phishing Kits Exposed: Cato Networks' In-Depth Analysis and Real-Time Defense

Phishing remains an ever persistent and grave threat to organizations, serving as the primary conduit for infiltrating network infrastructures and pilfering valuable credentials. According to an FBI report phishing is ranked number 1 in the top five Internet crime types. Recently, the Cato Networks Threat Research team analyzed and mitigated through our IPS engine multiple advanced Phishing Kits, some of which include clever evasion techniques to avoid detection.

Using Insight to Seize the SASE Opportunity

In today’s hybrid working environment, the software as a service (SaaS) apps employees use, and security service edge (SSE) solutions organizations use to secure it are dynamic and distributed. You sometimes need to deal with complex user experience issues without clear visibility into where they originate. Let’s take a look at some increasingly common situations and explore some proven ways IT leaders are regaining control.

Sysdig integration with Backstage

Developers are frequently tasked with working with multiple tools in the cloud-native era. Each of these tools plays a crucial role in the application life cycle, from development to deployment and operations. However, the sheer variety and diversity of these tools can increase the likelihood of errors or the accidental inclusion of critical vulnerabilities and misconfigurations.

Cloud Threats deploying Crypto CDN

The Sysdig Threat Research Team (TRT) discovered a malicious campaign using the blockchain-based Meson service to reap rewards ahead of the crypto token unlock happening around March 15th. Within minutes, the attacker attempted to create 6,000 Meson Network nodes using a compromised cloud account. The Meson Network is a decentralized content delivery network (CDN) that operates in Web3 by establishing a streamlined bandwidth marketplace through a blockchain protocol.

Cybersecurity in the Age of AI: Exploring AI-Generated Cyber Attacks

Historically, cyber-attacks were labor-intensive, meticulously planned, and needed extensive manual research. However, with the advent of AI, threat actors have harnessed their capabilities to orchestrate attacks with exceptional efficiency and potency. This technological shift enables them to execute more sophisticated, harder-to-detect attacks at scale.

File Integrity Monitoring vs. Integrity: What you need to know

Using security tools to monitor activities on IP based endpoints and the resulting changes that occur pose one of the most formidable challenges to security and regulatory compliance efforts, thanks to its potential to disrupt established security measures and protocols. Compliance frameworks, such as PCI DSS and NIST 800-53/SI-7, require organizations in every sector to maintain a consistent and secure environment to meet regulatory standards. Integrity is a foundational piece of this puzzle.

The European Union's Unified Approach to Cybersecurity: The Cyber Solidarity Act

The construction of a more cyber resilient European Union (EU) took a remarkable step forward this past week as negotiators from the European Parliament and the European Council reached a provisional agreement on the proposed Cyber Solidarity Act. Proposed last year, the Cyber Solidarity Act is composed of three key pillars that seek to crack the daunting challenge of detecting, preparing for, and responding to cybersecurity threats and incidents that shake up the security sphere.

FBI's 2023 Internet Crime Report Highlights Alarming Trends on Ransomware

The specter of cybercrime continues to grow, with losses soaring to $12.5 billion in 2023, according to the recently released Internet Crime Report by the FBI's Internet Crime Complaint Center (IC3). The revelations underline an alarming surge in cybercrime, affecting both business and personal interests alike, with the main attack vectors being investment fraud, business email compromises and an increased surge of ransomware attacks on nearly every critical infrastructure sector.

Three Essential Truths Every CISO Should Know To Guide Their Career

According to my research, it became clear that if CISO's focused on these three items, it would take care of 99% of the vulnerabilities. One: There are three top root hacking causes, and they comprise almost all of the cybersecurity risk most organizations face: These three most popular root hacking causes are often co-mingled together to bring about the desired effect.

Falcon Next-Gen SIEM Demo

In a world of stealthy, fast-moving threats and ever-increasing log volumes, defenders need an edge that’s orders of magnitude faster, smarter, and more scalable than current approaches. Watch this video to see how to detect and stop the adversary Alpha Spider quickly with CrowdStrike Falcon Next-Gen SIEM. Seamlessly extend the capabilities of the world-leading CrowdStrike Falcon platform to all data sources while stopping breaches and slashing costs compared to siloed tools.

GuLoader Downloaded: A Look at the Latest Iteration

GuLoader stands out as a prominent downloader founded on shellcode that has been used in many attacks aimed at spreading a diverse array of highly sought-after malware strains. For over three years, GuLoader has maintained its activity and is continuously evolving through ongoing development efforts. The latest iteration introduces novel anti-analysis techniques, making its analysis extremely difficult.

Mobile EDR for Security Professionals by Security Professionals

At Lookout, we’re no stranger to all the app risks, phishing attempts, and vulnerabilities that make mobile devices such appealing targets. Over the years, our researchers have identified 1500 threat families and have exposed some of the most sophisticated threats ever found, including Pegaussu, Dark Caracal, and — most recently — CryptoChameleon.