Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Use these simple rules to detect common attacker tools

One of the most powerful weapons at an attacker’s disposal is the use of specialized tools designed to compromise network security. Mimikatz, BloodHound, and winPEAS are just a few examples of tools that can wreak havoc in your environment if left undetected. In this article, we’ll explore how malicious actors can exploit specialized tools to launch sophisticated attacks.

Embargo Ransomware Expands Attacks to Cloud Environments

Ransomware continues to evolve, and the latest escalation in tactics comes from the Embargo ransomware group. Threat actor Storm-0501, known for its previous ties to various ransomware groups, has now shifted its focus towards hybrid cloud environments, targeting both on-premise and cloud-based systems. This strategic shift poses significant risks for organizations relying on cloud infrastructure, particularly those in critical sectors such as healthcare, government, transportation, and law enforcement.

Understanding and Detecting Lateral Movement

A ransomware attack is underway. The threat actor has gained initial access to an endpoint and executed malicious code on it. As far as the threat actor is concerned, things are going well. However, the next stage is critical to a ransomware attack’s success. Without the ability to spread throughout the entire environment, encrypting or locking up all systems, threat actors are unlikely to be able to extort payment from an organization.

Must-Know Strategies for DORA Compliance

In this episode of CISO Conversations: EU Data Regulations, Richard Cassidy, EMEA Field CISO at Rubrik, is joined by Anna Delaney, Director of Productions at Information Security Media Group (ISMG), to explore why the Digital Operational Resilience Act (DORA) makes operational resilience a priority for financial services organizations. They discuss how DORA will impact your financial institution, how to best prepare for DORA and improve operational resilience, and how to increase oversight and accountability of third parties in the supply chain.

Ransomware as a Business with Ken Westin from LimaCharlie

Ken Westin, Senior Solutions Engineer at LimaCharlie, joined us for Defender Fridays to discuss Ransomware as a Business. Join us every Friday as we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry.

Building a Cyber Resilient Healthcare System with Anahi Santiago, CISO at ChristianaCare

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Organizational Resiliency in Healthcare: Preparing for System Downtime #shorts #healthcare

Building organizational resilience is critical in healthcare. But it's not just about preventing cyberattacks—it's about ensuring patient care continues even when systems go down. Practicing cyber resilience through well-defined downtime procedures and understanding the critical outcomes for patients is essential. As Anahi Santiago, Chief Information Security Officer at ChristianaCare, emphasizes, knowing the path to achieve these outcomes, even in a crisis, is key to maintaining high standards of care.