Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Achieving High Organizational Security Scores Using Microsoft Secure Score

As businesses engage in increasingly complex and interdependent relationships, ensuring all parties maintain high cybersecurity standards becomes essential. One method to achieve this is using security scores, which are similar to personal credit scores, and assessing the efficacy of an organization's cybersecurity program. However, there are certain changes and additions that should be made to how scoring is conducted that will ensure a more accurate scores, which will benefit stakeholders at all levels.

Business Email Compromise (BEC): Tracking a Threat Actor's Funny Business

In a recent LevelBlue incident response engagement, an analyst in our managed detection and response (MDR) security operations center (SOC) responded to an alarm that was triggered by a suspicious email/inbox rule. The rule aimed to conceal responses to an internal phishing attempt from the account user, so the attacker could solicit funds from the company's users.

Unintentional Insider Threats: The Overlooked Risk

Could your employees be unintentionally putting your business at risk? While companies prioritize protection against external cyber threats, the often-overlooked unintentional insider threats can lead to significant financial and reputational risks for your business. These threats can come from simple human errors, such as accidental data sharing, misconfigurations, or falling victim to phishing attacks.

Comprehensive Digital Risk Defense: Dark Web Monitoring | Cyber Threat Intelligence | Digital Risk Protection

Many people mistakenly believe that the dark web is an obscure corner of the internet that doesn't affect them, but the reality is far more concerning. Dark web monitoring is crucial for identifying potential threats that can jeopardize personal and organizational security. From stolen data and illegal goods to sophisticated cyber threats like ransomware and phishing attacks, the dark web is a breeding ground for malicious activities.

3 Crucial Capabilities for Effective Cloud Detection and Response

Adversaries are increasingly attacking cloud environments, as evidenced by a 75% surge in cloud intrusions year-over-year in 2023. They are also getting faster: The fastest breakout time was clocked at just over 2 minutes, according to the CrowdStrike 2024 Global Threat Report. Today’s adversaries are outpacing legacy security approaches. Disjointed point solutions can’t scale or provide visibility into a rapidly growing attack surface.

Understanding and Addressing Data Security Challenges

The exponential growth of data in today’s digital age brings both enormous opportunities and significant challenges for businesses. While data drives innovation, personalizes customer experiences, and informs strategic decisions, protecting this important asset necessitates a strong and constantly evolving security posture. This blog goes into the fundamentals of data security, examines the challenges and issues that companies face, and proposes concrete methods for effective data protection.

Emerging Rust Malware Uses PowerShell to Evade UAC and Steal Data

A new Rust-based information-stealing malware named Fickle Stealer has been identified, using multiple attack vectors to compromise systems and extract sensitive information. According to Fortinet FortiGuard Labs, Fickle Stealer is being distributed through four different methods: VBA dropper, VBA downloader, link downloader, and executable downloader. Some of these methods employ a PowerShell script to bypass User Account Control (UAC) and execute the malware.

Top Cybersecurity Certifications To Earn Today

Splunk is proud to be recognized as a Leader in SIEM by Forrester, Gartner and IDC. Download the latest Magic Quadrant to see why. Get the report → Learn more about Splunk's Security Products & Solutions: The lucrativeness of cybersecurity keeps going up, with more companies realizing the need to employ reliable people to forestall and manage cyberattacks. That means there are plenty of security jobs available...however, the right people for this job aren’t always easy to find and hire.

Stop Phishing Attacks with Next-Gen SIEM and SOAR

Phishing is the weapon of choice for many adversaries. And it’s easy to understand why: Users fall victim to attacks in under 60 seconds on average, novice cybercriminals can launch effective phishing campaigns thanks to off-the-shelf phishing kits and generative AI, and above all, it works — 71% of organizations reported at least one successful attack in 2023.

Fundamentals of Origin Server Protection

Servers host applications and services; therefore, they are the center of all web, mobile, and API applications. These origin servers are under constant attack as hackers run probes to exploit open vulnerabilities and launch large-scale DDoS attacks that could bring down the entire infrastructure. Therefore, ensuring availability and protecting the integrity of origin servers is paramount. This article will cover what, why, and how of origin protection.