Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Gaining Network Transparency with Asset Discovery and Compliance for IT/OT

I recently came across the "Johari Window Model" and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that are applicable not just to IT and OT environments but also to other facets of our daily lives. This model can be applied to asset discovery and Fortra's Security Configuration Management (SCM) system.

Unintentional Insider Threats: The Overlooked Risk

Could your employees be unintentionally putting your business at risk? While companies prioritize protection against external cyber threats, the often-overlooked unintentional insider threats can lead to significant financial and reputational risks for your business. These threats can come from simple human errors, such as accidental data sharing, misconfigurations, or falling victim to phishing attacks.

Critical Mailcow Vulnerabilities: Safeguard Your Servers from Remote Code Execution

Mailcow Mail Server Vulnerabilities Expose Servers to Remote Code Execution Recently, two significant security vulnerabilities have been uncovered in the Mailcow open-source mail server suite. These vulnerabilities, which affect all versions prior to 2024-04, were disclosed by SonarSource on March 22, 2024, and could allow malicious actors to execute arbitrary code on vulnerable Mailcow instances. Understanding the Vulnerabilities.

Understanding and Addressing Data Security Challenges

The exponential growth of data in today’s digital age brings both enormous opportunities and significant challenges for businesses. While data drives innovation, personalizes customer experiences, and informs strategic decisions, protecting this important asset necessitates a strong and constantly evolving security posture. This blog goes into the fundamentals of data security, examines the challenges and issues that companies face, and proposes concrete methods for effective data protection.

CDK Global Cyber Incident Affects Automotive Dealers Across the US

On June 19, 2024, CDK Global notified customers that a cyber incident had led to a shutdown of its systems, significantly impacting car dealerships across the United States. CDK Global serves nearly 15,000 dealership locations, and the incident caused substantial disruption, forcing car dealerships to halt operations and revert to manual processes. Dealerships were initially notified about the incident around 2AM Eastern time on June 19, 2024, with an update at 8AM confirming the incident.

Achieving High Organizational Security Scores Using Microsoft Secure Score

As businesses engage in increasingly complex and interdependent relationships, ensuring all parties maintain high cybersecurity standards becomes essential. One method to achieve this is using security scores, which are similar to personal credit scores, and assessing the efficacy of an organization's cybersecurity program. However, there are certain changes and additions that should be made to how scoring is conducted that will ensure a more accurate scores, which will benefit stakeholders at all levels.

Business Email Compromise (BEC): Tracking a Threat Actor's Funny Business

In a recent LevelBlue incident response engagement, an analyst in our managed detection and response (MDR) security operations center (SOC) responded to an alarm that was triggered by a suspicious email/inbox rule. The rule aimed to conceal responses to an internal phishing attempt from the account user, so the attacker could solicit funds from the company's users.

IoT Security Regulations: A Compliance Checklist - Part 1

The Internet of Things (IoT) refers to the global network of physical devices connected to the internet, capable of collecting and sharing data. IoT devices range from everyday household items to sophisticated industrial tools. By integrating sensors and communication hardware, IoT bridges the gap between the physical and digital worlds, enabling environments where smart devices operate interconnectedly and autonomously.