Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Deep dive on the BLISTER loader

Yesterday, the Elastic Security Research Team released a detailed report outlining technical details regarding the BLISTER launcher, a sophisticated campaign that we uncovered in December 2021. This latest release continues on research we’ve developed while observing the campaign over the last few months — specifically pertaining to the technical details of how the group behind this payload is able to stay under the radar and evade detection for many new samples identified.

Coded for Safety

Ready to secure government applications? Start with Zero Trust. Trust is the foundation of successful relationships. We want to trust our friends, companies, government, etc., and be trusted in return. But, sometimes mistrust better serves us. A few years ago, the cyber world adopted an approach to security known as trust-but-verify. A simplistic approach, it delivered innovative digital services to consumers – securely and efficiently.

Featured Post

World Password Day - The password's time has passed

Some 90% of security breaches can be avoided by using multi-factor authentication (MFA). Yet most enterprises still rely only on usernames and passwords - and avoid other strong second-factor authentication methods - to make user sign-on both safe and convenient. Our addiction to passwords seems to be a long-standing issue. In order to stay secure, users have to make passwords complicated, only to spend time remembering and then forgetting them, which has resulted in more IT support.

How Falcon OverWatch Spots Destructive Threats in MITRE Adversary Emulation

In the recent ​​MITRE Engenuity ATT&CK Enterprise Evaluation, CrowdStrike demonstrated the power of its unified platform approach to stopping breaches. Facing attack emulations from the highly sophisticated WIZARD SPIDER and VOODOO BEAR (Sandworm Team) adversaries, the CrowdStrike Falcon® platform: The results show that CrowdStrike stands alone in providing a unified approach to stopping adversaries from progressing attacks.

How to improve your Watchtower score in 1Password

The idea behind World Password Day is simple: to promote the use of strong, unique passwords to keep your accounts protected and your browsing safe. For those of you wondering how best to celebrate the day, we’ve got a challenge for you: how high can you get your 1Password Watchtower score? While a high Watchtower score won’t give you access to better loan rates, it will give you peace of mind. Not to mention some bragging rights, too.

$43 billion stolen through Business Email Compromise since 2016, reports FBI

Over US $43 billion has been lost through Business Email Compromise attacks since 2016, according to data released this week by the FBI. The FBI’s Internet Crime Complaint Center (IC3) issued a public service announcement on May 4 2022, sharing updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and phishing techniques to break into accounts and trick companies into transferring large amounts of money into the hands of criminals.

Calligo partners with BigID to accelerate Data Privacy, Security and Governance for our clients

Today, Calligo announced that we have partnered with BigID. The BigID data intelligence platform enables organizations to know their enterprise data and take action for privacy, security, and governance. This partnership will enable Calligo to provide clients with the ability to proactively discover, manage, protect, and gain more value from their regulated, sensitive, and personal data across their data landscape.

From Behavior Analytics to Security Education: 4 Ways Organizations Should Mitigate Modern Insider Attacks

While the stakes for private sector organizations differ drastically from governments that have to protect state secrets like hacking tools or nuclear technologies, businesses do have their own needs for Data Loss Prevention measures. Organizations can face the threat of data like their intellectual property (IP), source code, customer details, Personally Identifiable Information (PII), financial info, and many other types of information being stolen or corrupted.

World Password Day 2022: Best Practices for Keeping Your Organization Safe

There is a bit of serendipity associated with World Password Day 2022. This year the day falls on May 5, the day before the first anniversary of the devastating Colonial Pipeline ransomware attack, which was initiated through a compromised password. The combination of National Password Day and the Colonial Pipeline anniversary should help remind everyone that password security is incredibly important and ever evolving.