Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Arctic Wolf Labs Observes Threat Campaign Targeting Cleo MFT Products - Remediation Guidance

Update: Dec 11, 2024. Find the latest information in our follow-up security bulletin. On December 7, 2024, Arctic Wolf began observing a novel campaign exploiting Cleo Managed File Transfer (MFT) products across several customer environments. Initial indications of malicious activity in this campaign were identified as early as October 19, with a sharp increase in early December.

New RBAC feature offers granularity and flexibility for Outpost24's EASM customers

A new role-based access control (RBAC) feature has been added to Outpost24’s external attack surface management (EASM) solution. This opens up new possibilities for Outpost24 customers, allowing them to be more granular when it comes to configuring permissions for different roles.

Have I Been Pwned? 8 Ways to Protect Your Emails

Are you worried that your email has become one of over 14 million in a data breach? Then worry no longer! This article will give you all the advice to secure your email account, prevent your email from being leaked online, and minimize the risks of phishing, ransomware, and other cyber threats. The first step you will need to take in a have I been pwned situation is to check if your email has been exposed in a data breach.

DR Guide for Humans: Keys to Understanding MDR, EDR, NDR, XDR (PART 1)

Over the past decade, Detection and Response (DR) solutions have advanced substantially to address the constantly evolving sophistication of cyberattacks. Malicious actors have perfected techniques to evade traditional defenses, making detection and response solutions key requisites in a robust cybersecurity strategy.

Virtual Machine Backup Software: A Guide to Data Protection

Virtual machines form the backbone of most enterprise IT systems, which means effective virtual machine backup software is essential for safeguarding business operations. Companies need reliable backup solutions to protect their virtualized applications and data from unexpected failures, breaches, or system crashes.

Fireblocks CEO Says Stablecoins, Tokenization Have "Enormous Untapped Potential" At SPARK Conference

The anticipated change in stance from US regulators will drive a huge boost to global stablecoin adoption, which is already rapidly gaining traction as their share in cross-border and business-to-business payments grows, according to Michael Shaulov, CEO of Fireblocks.

Phishing Attacks Are Now Leveraging Google Ads to Hijack Employee Payments

Researchers at Silent Push warn that a phishing campaign is using malicious Google Ads to conduct payroll redirect scams. The attackers are buying search ads with brand keywords to boost their phishing pages to the top of the search results. “We have identified hundreds of domains primarily focused on Workday users and high-profile organizations, including the California Employment Development Department (EDD), Kaiser Permanente, Macy’s, New York Life, and Roche,” the researchers write.

Quick Learn: Four Capabilities of PAM

In this edition, Rom discusses four essential capabilities to consider when using a solution to manage cloud privileges and access to resources. He emphasizes the importance of visibility across all cloud access, planning for scale upfront, speaking the language of both security and DevOps, and ensuring easy onboarding and fast adoption. These four points are a great starting point for making the right PAM buying decision.

Phishing Holds the Top Spot as the Primary Entry Point for Ransomware Attacks

New analysis of ransomware attacks shows that phishing is the primary delivery method and organizations need to offer more effective security awareness training to mitigate the threat. Hornet Security’s Q3 2024 Ransomware Attacks Survey report paints a pretty bleak picture of how organizations have fared this year against ransomware attacks. So almost one in five organizations is a victim. According to the survey data, 52.3% of the attacks started with a phishing email.

Cloud Logs: The Unsung Heroes of Detection and Response

Cyberattackers are exploring stealthier and more sophisticated methods to infiltrate cloud environments. From exploiting misconfigurations to leveraging stolen credentials, adversaries are skilled at evading detection. Cloud logs are invaluable in helping organizations identify potential threats before they can cause damage.