Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike's Threat Actor List

On July 24, 2024, hacktivist entity USDoD claimed on English-language cybercrime forum BreachForums to have leaked CrowdStrike’s “entire threat actor list.”1 The actor also alleged that they had obtained CrowdStrike’s “entire IOC list” and would release it “soon.” In the announcement, USDoD provided a link to download the alleged threat actor list and provided a sample of data fields, likely in an effort to substantiate their claims.

Double Dipping Cheat Developer Gets Caught Red-Handed

Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves around the developer of the popular EvolvedAim, a cheat for Escape From Tarkov. He sold his tool with an information stealer bundled with it, double-dipping and causing damage to his clients and to the game itself.

Repo Jacking: The Great Source-code Swindle

In this post, we explore a powerful, yet widely unknown attack vector which has emerged in the last couple of years known as ‘Repo Jacking’. During our research, we discovered the enormous potential to compromise software components with tens of millions of downloads across the Terraform IaC (Infrastructure as Code) and Composer (PHP package registry) ecosystems. Despite its power, Repo Jacking remains under-researched and frequently misunderstood.

Identify Possibly Impacted Hosts with CrowdStrike Dashboard

This video is an overview of the dashboard available for CrowdStrike Insight customers to identify possibly impacted devices related to the recent defect in a CrowdStrike content update for Windows hosts. For more information on this dashboard, please visit the CrowdStrike Remediation and Guidance Hub.

Using MITRE ATT&CK for Incident Response Playbooks

A structured approach to incident response enables you to create consistently repeatable processes. Your incident response playbook defines responsibilities and guides your security team through a list of activities to reduce uncertainty if or when an incident occurs. MITRE ATT&CK Framework outlines the tactics and techniques that threat actors use during different stages of an attack.

About CultureAI | Human Risk Management Platform

Monitor, reduce, and fix your human cyber risks. The CultureAI Human Risk Management Platform enables security teams to proactively monitor human risk across multiple applications, providing immediate visibility into the riskiest employee behaviours and security vulnerabilities within an organisation.

Strategies for Increasing AI Efficiency - Insights from the Cisco Research Efficient AI Summit

As AI models become more accurate, they are becoming much larger, requiring a significant amount of computing power to run. How can we make the future of AI more scalable and sustainable? Cisco Research hosted a virtual summit on efficient AI, bringing together researchers to explore efficient AI challenges and discuss opportunities for solving those challenges now and into the future. The Cisco Research team has been working on efficient AI initiatives for several years, contributing research papers and incorporating their work into an open-source project called ModelSmith.