Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

North Korea-Linked Threat Actor, Diamond Sleet, Distributes Modified CyberLink Installer in Supply Chain Compromise

Beginning on at least October 20, 2023, a North Korea-linked threat actor, tracked as Diamond Sleet by Microsoft, leveraged a modified CyberLink installer to compromise victim assets. CyberLink Corp. is a Taiwan-based multimedia software company that develops media editing and recording software.

Inside the Mind of a Cybersecurity Threat Hunter Part 1: Confronting Initial Access Techniques

At Corelight, we’re always striving to make the life of threat hunters and security analysts a little easier. It’s the reason we developed our Open NDR Platform that provides comprehensive, correlated network data and forensic evidence about everything happening on the network. If you’re familiar with Corelight, you probably already know that.

How To Recover From a Ransomware Attack

If you’re the victim of a ransomware attack, there are no guarantees that you can recover your stolen data. The best you can do is mitigate the effects of the attack and remove the ransomware from your device. The steps to recover from a ransomware attack include isolating your device, removing the ransomware, restoring your backed-up data and changing any compromised login credentials.

Keeper Security Government Cloud Lands Three ASTORS Homeland Security Awards

Keeper Security is excited to announce that our government solution, Keeper Security Government Cloud has been honored with three ASTORS Homeland Security Awards. The FedRAMP Authorized password and privileged access management platform was recognized for Best Cyber Security Solution, Best Privileged Access Security Solution and Best Cyber Encryption Solution at the annual ASTORS awards ceremony held in New York City.

Huntress Finds Business Email Compromise (BEC) Increases In Q3, 2024

Huntress has released a report finding that business email compromise (BEC) attacks have risen in the third quarter of 2023. “64% of identity-focused incidents in Q3 2023 involved malicious forwarding or other malicious inbox rules, a key indicator of business email compromise (BEC),” the researchers write. “Another 24% of identity-focused incidents involved logins from unusual or suspicious locations.

Initial Access Broker Activity Doubles in One Year's Time

New data sheds light on just how active the Initial Access Broker (IAB) business is, and the growth uncovered doesn’t bode well for potential victim organizations. There’s plenty of fodder in tech news about the use of IABs and their role in cyber attacks. But rarely do we get to see a more comprehensive analysis of just how much growth in both the number of brokers and posts of credentials for sale.

Top 5 Open Source Security Risks IT Leaders Must Know

Lurking in the open source software (OSS) that pervades applications around the world are open source security risks technology leaders must be aware of. Software is one of technology’s most vulnerable subsets with over 70% of applications containing security flaws. Here are the open source security risks IT leaders must be aware of to protect technology and help it scale safely.

Welltok's MOVEit Breach Returns, Another 426k Records Exposed

Welltok operates an online wellness program various organizations use to encourage healthy lifestyles. They’ve been in our news frequently as the global MOVEit breach continues. Around nine million people have had their information exposed resulting from Welltok’s breach in the last few weeks; this week, Welltok’s breach returns with a double threat target—Premier Health and Graphic Packaging International.

Navigating the Waters of Change: A Risk Expert's Roadmap for NYDFS Cybersecurity Regulation Compliance

In the fast-paced world of cybersecurity, change is not only constant but crucial. The New York Department of Financial Services (NY-DFS) demonstrated that principle on Nov. 1, 2023, when it completed a sweeping set of updates to its cybersecurity regulation. If you find yourself apprehensive about these changes, fret not — I’m here to guide you through the process and to provide a comprehensive plan for successfully meeting the new regulations.

What is Re KYC? What are the steps for Re KYC?

Know Your Customer (KYC) data is documentation and contact information obtained while creating a bank account. According to the RBI’s recommendations, banks may request Re KYC from customers at set periods to keep the data up-to-date, which can be done by the customer by filling out a Re KYC form. For example, if any of your personal or contact information has changed, the Re KYC procedure will update it.