Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

Coffee with Jim - Securing Against Supply Chain Cyber Attacks

Following the ransomware attack on US IT firm Kaseya, join us for a chat about the ever-increasing need to secure ourselves successfully against not only direct ransomware attacks, but those that affect us through our supply chains. An estimated 200+ firms have been crippled by the attack on Kaseya, simply because they use Kaseya’s software. The implication of this is that it can feasibly happen to any aspect of your supply chain, so if cyber security is not high on your board’s list of priorities, it really should be. How could the attack on Kaseya, and other supply chain attacks, have been avoided? How can you reduce the probability of it happening to your own organisation? And crucially, how can you make the solution cost effective?

Impersonation attacks leverage Silicon Valley Bank collapse in new phishing campaign

As news of Silicon Valley Bank’s (SVB) collapse continues to dominate the headlines, cybercriminals are running phishing campaigns impersonating SVB and other financial institutions, including M-F-A and Bloomberg. Responding quickly to the 24-hour news cycle, cybercriminals aim to leverage their victims’ potential distress over their financial situation to make them more susceptible to this type of attack.

Telegram of Fortune: Credential Phishing

In recent years, phishing attacks have become increasingly sophisticated and are now being conducted through various messaging platforms such as Telegram. Telegram is a popular messaging app that allows users to send messages, photos, videos, and other files over the internet. It also provides APIs that allow developers to create custom bots and applications. Unfortunately, these same APIs can be used by malicious actors to exfiltrate credentials successfully phished from attacks.

Over 9 Million AT&T Customers Exposed in Recent Cyber Attack

AT&T is a massive telecommunications company with its headquarters in Dallas, Texas. The company is known as the largest telecommunications company in the world according to its revenue, and it is the third-largest mobile phone service provider in the United States. The company recently suffered an attack that exposed some of its customer data to hackers and may have put customers at risk. The attack wasn't on AT&T directly but on one of the company's external marketing vendors instead.

5 Steps to Improve Your Cyber Attack Response

When cybersecurity experts speak about a cyber attack, they often refer to actions taken “left of boom” and “right of boom.” In this analogy, the boom is the breach, and the actions organizations take in the aftermath, such as utilizing their incident response plan or working with their cyber insurance company on a claim, are what happens “right of boom.” But it’s the things that happen “left of boom” that can make the difference between proactive and

Supply Chain Attacks: What You Need to Know

Every day, thousands of companies download updates to their software. With a click of a button, they can walk away and return the next morning with everything reorganized and in order. While a staple of modern life, this action is no longer completely harmless. It is now one of many attacks that bad actors use to access systems and execute supply chain attacks.

Lawmakers and Capitol Hill Staff Get Hit By a Cyber Attack on DC Health Link

DC Health Link is part of the Affordable Care Act online marketplace of health insurance plans. The service provides health care to members of Congress as well as many staff members throughout Capitol Hill. This healthcare service was recently the victim of a cyber attack and suffered a serious data breach that exposed hundreds of politicians and Capitol Hill staff members.

Acer Repair Documents, Images, and More Are Stolen in Cyber Attack

Acer is a well-known tech company that's based in Taiwan and with facilities and offices around the world. The company's main headquarters are in San Jose, California, in the United States. The company is known for engineering, technical manufacturing, and creating many products in the electronics industry today. The organization recently suffered a significant data attack that may have exposed company secrets, product keys, and many software images that could hurt the organization.

VMware ESXi Servers: A Major Attack Vector for Ransomware

In our new threat briefing report, Forescout’s Vedere Labs provides details on the recent ransomware campaign targeting VMware ESXi virtualization servers, or hypervisors, and analyzes two payloads used in these attacks: variants of the Royal and Clop ransomware. We also present the tactics, techniques and procedures (TTPs) used by attackers in this campaign, discuss mitigation recommendations and list indicators of compromise (IOCs) that can be used for detection or threat hunting.