Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

New use of Emotet malware within Microsoft OneNote attachments aims to help cybercriminals evade detection

Since March 2nd, 2023, intelligence from the Egress Intelligent Email Security platform shows Emotet malware being used within Microsoft OneNote attachments, as cybercriminals evolve their attacks in attempts to avoid detection. Emotet is sophisticated malware primarily used for stealing sensitive information, such as credentials, from the machines it infects.

Trust Assurance: The Movement that's Making GRC Believable Again

In business, we measure everything. Like the saying goes, “What gets measured gets done,” and most companies pay close attention to KPIs like qualified leads, new pipeline, net customer retention and fraction of roadmap completed on time. But if you were asked, “Are you meeting all your trust obligations with your employees, customers, board members, and the government?”, how would you answer?

The Dangers of Vishing Campaigns and How To Protect Yourself

In recent years, cybercrime has evolved to become more sophisticated than ever before. One of the up and coming methods used by criminals is vishing (voice phishing). This is where an attacker phones up a victim to simulate a trusted source such as a bank to phish for sensitive information. No one is immune from a vishing attack, even the Social Security Administration.

Ransomware Data Theft Extortion Goes up 40% to 70% From '21 to '22

A report from Palo Alto Networks’ Unit 42 found that data theft extortion occurred in 70% of ransomware attacks in 2022, compared to 40% in 2021. The researchers examined the four most common methods of cyber extortion (encryption, data theft, harassment, and DDoS attacks) noting that threat actors often combine these tactics within a single attack campaign.

New Vendor Email Compromise Attack Seeks $36 Million

The details in this thwarted VEC attack demonstrate how the use of just a few key details can both establish credibility and indicate the entire thing is a scam. It’s not every day you hear about a purely social engineering-based scam taking place that is looking to run away with tens of millions of dollars. But, according to security researchers at Abnormal Security, cybercriminals are becoming brazen and are taking their shots at very large prizes.

Trust Talks with Dan Walsh, CISO at VillageMD

Sravish sits down with Dan Walsh to discuss trending topics in the GRC space. Dan shares his thoughts on SBOMs and what the future of security could look like. Here’s what they discuss: What does T.R.U.S.T. stand for? How VCs should leverage CISOs on the Board of Directors Why Dan is a big fan of SBOM Dan’s vision for a Trust Exchange.

4 Things to Know About FISMA

Recently, we discussed the most effective cybersecurity frameworks to reduce the risk of cyber threats. One of the most important systems is the Federal Information Security Management Act (FISMA). This act applies to certain organizations, and is imperative to help protect them against data breaches. Let’s take a look at four things to know about FISMA, from what it is to how to monitor FISMA compliance.

Protegrity: Your Data Privacy Solution

The new age of data protection is here. As businesses work to maintain compliance to develop and improve their globalization efforts, they will need a data protection solution to keep up. The leaders who can transform this threat into opportunity will be positioned to gain market share and overtake their competitors in tomorrow’s global business landscape. De-identify, preserve values, and protect persistently across borders with Protegrity.

Cloudflare Cache Reserve Walkthrough and Demo

Many organizations store large, infrequently changing assets like videos, images or large binary files on cloud provider networks for easy access. Unfortunately, any time an asset is fetched from the origin server, many cloud providers charge an egress fee. These egress fees can quickly add up and become a significant cost. Cloudflare’s Cache Reserve helps minimize these unnecessary egress fees by reducing origin egress and optimizing cache hit ratios.