Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Weekly Cybersecurity Recap March 10

It's been a rough week for major companies and the government as well, with the week finishing off with Washington D.C. lawmakers having their health information exposed. This week's attacks make it very clear that nobody is safe from cyber gangs and hackers. Dole, Dish Network, and Acer all suffered data losses this week, as well as the Crystal Bay Casino.

I caused my company's data breach. Now what?

You’ve just sat down to start your work day and you’re going through your emails, hot cup of coffee in hand. You see an email from your company’s IT department telling you to install an update ASAP. As soon as you click the link in the email, you realize you probably should have checked with IT first.

Sick of that Security Questionnaire? Automation is the Answer

Security questionnaires (SQs) are not fun. They’re time-consuming, tedious work and sometimes, they’re the one thing standing between you and a closed deal. Fortunately, the emergence of AI in the security space has resulted in many day-to-day workflows being streamlined – with SQs being one of them. Security questionnaire automation solutions have been on the rise.

National Australia Bank executes world-first cross-border stablecoin transaction, powered by Fireblocks

National Australia Bank has completed an intra-bank, cross-border transaction using NAB-issued stablecoins. This represents a world-first by a major financial institution on a layer-one public blockchain (Ethereum). The pilot transaction involved the deployment of stablecoin smart contracts for 7 major global currencies, namely Australian, New Zealand, Singapore and US dollars, Euro, Yen, and Pound Sterling.

VMware ESXi Servers: A Major Attack Vector for Ransomware

In our new threat briefing report, Forescout’s Vedere Labs provides details on the recent ransomware campaign targeting VMware ESXi virtualization servers, or hypervisors, and analyzes two payloads used in these attacks: variants of the Royal and Clop ransomware. We also present the tactics, techniques and procedures (TTPs) used by attackers in this campaign, discuss mitigation recommendations and list indicators of compromise (IOCs) that can be used for detection or threat hunting.

New Content Preview Feature Results in up to 90% Productivity Increase

The Nightfall platform is lauded by customers for its high accuracy detection of sensitive data across a variety of cloud environments. This helps users save time by only surfacing the most relevant and most critical instances of sensitive data exposure. We’re always looking for ways to continue to build value in this area, and many of our feature updates like our new PHI detector and enhanced secrets detection releases accomplish this.

Demystifying SIEM migration: Pitfalls to avoid and tips for ensuring success

Migrating to a new security information and event management (SIEM) solution can feel like a daunting task, like moving to a new house. Over the years, a lot gets accumulated and sometimes is forgotten until found in a corner. This blog identifies steps you can take to reduce the pain typically associated with a migration, tools that can help along the way, and questions you should ask during each phase of a migration.