Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Netskope Threat Coverage: BlackSnake Ransomware

BlackSnake is a ransomware-as-a-service (RaaS) group that first appeared in a hacking forum in August 2022, where the operators were seeking affiliates and stating that they would take 15% of the profit, which is below the typical average of 20-30%. On February 28, 2023, a new variant of BlackSnake was spotted, and is notable for having a clipper module that targets cryptocurrency users.

WAF is woefully insufficient in today's container-based applications: Here's why

According to the Cloud Security Alliance, the average large enterprise has 946 custom applications deployed. Traditionally, organizations deployed Web Application Firewalls (WAF), which provide visibility and enforce security controls on external traffic that passes through them, at the perimeter to protect these applications against external attacks.

What Is Zero Trust and Why Is it So Important?

You’ve heard about it. A lot. But there are quite a few nuances when it comes to how Zero Trust security is defined and discussed. Is it a platform or a principle? It’s one of those terms that’s so widely cited that it has the tendency these days to elicit eye rolls within the cybersecurity industry and to be referred to as a buzzword by those sitting at the cool kids’ lunch table.

Cerebral Unintentionally Leaks Patient Data to Google, Meta, and TikTok

Cerebral is an online mental health company that's attempting to bring mental health care to patients around the country virtually. The company deals with tens of thousands of patients, and we've just learned that many of those patients may have had their information exposed to companies like Meta, Google, and TikTok. Cerebral is a startup company, and unfortunately, it isn't that unusual for startups to suffer from data issues such as this one.

Patching Vulnerabilities Within 24 hours

The average time of vulnerabilities remain open is 180+ days from the time it is discovered. When it comes to business growth vs security, business always wins, which means vulnerabilities are not patched on time allowing hackers to exploit them. However, most of these can be patched using Virtual patching. That too within 24 hours and ZERO impact to business continuity.

Webinar: Top 3 Opportunities for MSPs in 2023 and Beyond - 16 March 2023

It’s no secret that staying ahead of the competition in an ever-evolving cybersecurity landscape can be incredibly difficult, but with managed services you're up to the challenge! Get invaluable insights into both technical & business initiatives needed for you to stay on top of the game. Explore topics such as XDR, demonstrating relevance during economic uncertainty, and leveraging vendor-managed services to propel MSP capabilities. Don't get left behind — join us in transforming your 2023 outlook today!

Is it Safe to Store Credit Card Information Online?

No, it is not safe to store your credit card information online, including on merchant websites or web browsers. The only way to ensure your credit card information is stored safely is if you keep it in an encrypted vault. Read on to learn more about the risks of storing your credit card information online and how you can secure your credit cards moving forward.

What is Service-to-Service Authorization?

A microservice application comprises small autonomous services that communicate with each other through application programming interfaces (APIs) — as standalone services or via a service mesh. These API calls or requests raise security and compliance concerns if not appropriately secured through authentication and authorization checks. Service-to-service authorization is the process of determining what actions an authenticated service is allowed to perform based on pre-defined policies.

Should Cyber Insurance Cover Ransomware Protection?

Companies around the world and across industries face greater cyber threats than ever before. Cybersecurity incidents are becoming ever more frequent, and the costs associated with those attacks have marched upward too. As the risks grow, companies have strengthened their capabilities, both in prevention and incident response. Still, no company can guarantee that it will never be hacked, so companies must have cyber insurance in place in case the worst happens.

Seamless Response to Ransomware and a Cyber Resilience Upgrade

A major logistics company was hit by a ransomware attack at a time when it was reviewing and upgrading its cybersecurity defense. Kroll provided seamless incident response to enable the company to act quickly to mitigate and minimize the damage caused by the attack. The company also deployed Kroll Responder, Kroll’s award-winning Managed Detection and Response (MDR) solution, giving it comprehensive 24/7 visibility and management of threats and enhancing its long-term cyber resilience.