Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Stories from the SOC: Caught in the Trap: Detecting and Defending Against RaccoonO365 Phishing Campaigns

In September 2024, LevelBlue conducted a comprehensive threat hunt targeting artifacts indicative of Phishing-as-a-Service (PhaaS) activity across our monitored customer fleet. During the investigation, the LevelBlue Managed Detection and Response (MDR) Blue Team discovered a new PhaaS kit, now identified as RaccoonO365. The hunt confirmed true-positive compromises of Office 365 accounts, prompting swift customer notifications and guidance on remediation actions.

AI in Cybersecurity: 20 years of innovation

From predictive systems to the recent proliferation of generative AI-based virtual assistants such as ChatGPT, artificial intelligence has become a key driver in many sectors, and cybersecurity is no exception. The disruptive impact of GenAI has popularized AI use recently but this technology has actually been deployed for over 20 years in the security sector, serving as an additional and critical tool for proactive threat management that enhances operational efficiency.

Internxt Becomes The First Cloud Storage With Post-Quantum Cryptography

Internxt is proud to be one of the first cloud storage companies to protect business and individual data with the world’s most advanced encryption, post-quantum cryptography. Our post-quantum encryption protects your files and data from the potential threats of quantum computers that hold the power to break current encryption protocols due to their superior ability to solve complex algorithms in minutes or even seconds.

Enhance Your Security Posture with Microsoft Azure Native Tools and Tanium

When it comes to securing your business, visibility into your company’s devices is key. As we so often say, you can’t protect what you can’t see. What’s more, visibility into your devices needs to be accurate and current – your IT security and operations teams can’t protect your environment if they’re working from data that’s hours (or days or weeks) old.

How to Lock Your Social Security Number Safely

Identity thieves will do anything to get your Social Security Number (SSN). It's a very important piece of personal information. Locking your SSN is a proactive way to protect your name and money from fraud. The Federal Trade Commission (FTC) says that over 1.4 million Americans were victims of identity theft in 2022. Many of these crimes involved stolen Social Security numbers. To lower these risks, you need to learn how to safely lock your Social Security Number.

Ransomware Gangs Claimed More Than 5,000 Attacks in 2024

Ransomware groups claimed responsibility for 5,461 attacks in 2024, with 1,204 of these attacks being publicly confirmed by victim organizations, according to Comparitech’s latest Ransomware Roundup report. The average ransom demand was more than $3.5 million, and the average ransom paid was $9.5 million. Many of these attacks involved data theft extortion, leading to the breach of nearly 200 million records.

ConVErsations: Criminal Discussion of Vulnerabilities and Exploits

Defenders often discuss security vulnerabilities on GitHub, Stack overflow, X (formerly Twitter), and other platforms to share knowledge of these threats and ensure users know when patches are available. Cybercriminals have a similar process, choosing to share vulnerability news, exploit code, and engage in technical discussions on cybercriminal forums. However, in contrast to defenders, these threat actors share this knowledge for the purpose finding unpatched systems and exploiting them.

The 2025 DORA Deadline is Here: Simplify Compliance with Teleport

The Digital Operational Resilience Act (DORA) comes into full effect on January 17, 2025. This deadline marks a monumental shift in how financial institutions and their technology providers prioritize and maintain operational resilience and cybersecurity standards – and sets in stone real business and regulatory consequences to ensure resilience is achieved. And like any sweeping security regulation, organizations must embark on an uphill journey to earn full compliance.

What is the Threat Landscape?

The threat landscape refers to the evolving environment of cyber threats, attack methods, and attack vectors targeting organizations, governments, and individuals. Shaped by threat actors like hackers, nation-states, and criminal groups, it has grown increasingly complex with the rise of cloud computing, IoT devices, and interconnected supply chains. These changes have expanded attack surfaces, offering adversaries more opportunities to exploit vulnerabilities.

Detecting and mitigating CVE-2024-12084: rsync remote code execution

On Tuesday, January 14, 2025, a set of vulnerabilities were announced that affect the “rsync” utility. Rsync allows files and directories to be flexibly transferred locally and remotely. It is often used for deployments and backup purposes. In total, 6 vulnerabilities were announced to the OSS Security mailing list. The most severe vulnerability, CVE-2024-12084, may result in remote code execution. This post will cover how to detect and mitigate CVE-2024-12084.