Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CL0P Ransomware: The Latest Updates

Responsible for a number of infamous ‘big game hunter’ ransomware attacks and believed active since at least 2019, the ransomware threat group dubbed ‘CL0P‘ is thought to be a Russian-language cybercriminal gang and have been widely reported as associated with, or their malware adopted by, other cybercriminal groups including ‘FIN11’, a part of the larger financially-motivated ‘TA505’ group, and ‘UNC2546’.

Insider Threat Indicators: 10 Warning Signs to Look For

Businesses face myriad cyber security risks, from phishing to unauthorized access of proprietary information. While restricting access rights and maintaining strict security measures can help, potential insider threats are always a risk. Organizations must effectively monitor for signs of insider threats to prevent financial loss or compromising critical assets.

A Guide to NIS 2 Requirements and How Cyberint Helps Meet Them

Cyber threats against critical infrastructure – such as energy and transportation networks – remain pervasive as ever, with 2023 witnessing an astounding 420 million such attacks in total. That’s the bad news. The good news is that critical infrastructure is set to become more secure, at least in the European Union, thanks to the NIS 2 Directive (also known as E.U. Directive 2022/2055).

Lessons Learned from 7 Real Insider Threat Examples

Organizations must navigate myriad security threats. While many cyber threats come from malicious actors outside the organization, insider threats can be even more devastating to a business. Insider threat prevention should be a top priority for security teams. But what are these cyber attacks, and what do they teach us about how to protect critical assets? Here, we examine several real-world examples of insider threats at major organizations and what those organizations did to remediate the threat.
Featured Post

Cloud computing - The first step to an effective data modernisation strategy

Many organisations realise the benefits that lie within the data they collect daily. This modern approach to data empowers businesses to leverage data for innovation and monetization while at the same time enhancing security and privacy. While this may seem like a conundrum as companies have traditionally buried their data deep into IT architecture to prevent it from being accessible, even by the employees, today it is possible to have the best of both. This process starts with the cloud.

What is an efficient tool for criminal case management and biometric evidence analysis?

Criminal investigations need to be on point and effective. Thanks to the latest tech, law enforcement teams now have some fairly cutting-edge tools at their disposal for cracking cases and excavating biometric evidence. In this blog post, we're going to explore why these tools are absolutely crucial and the tremendous difference they make in police work.

Remote Work Business Continuity: Best Practices

Incorporating remote work among companies has been one of the developments in recent years. In fact, a staggering 98% of employees express their desire to have this kind of dynamic in their jobs. The shift is here to stay as more and more organizations are adopting it as part of their work culture because of its many advantages. This integration is essential as employers move forward with their business continuity plans.

Improve File Management in Microsoft Teams with Egnyte Integration

Microsoft Teams has seen a remarkable surge in popularity and usage post-pandemic. With 320 million+ users spanning more than 1 million organizations, it serves as an important tool to keep teams connected and foster productivity. While MS Teams excels in real-time collaboration, conversational channels, online meetings, and video calls, it grapples with file management and accessibility stemming from its inherent design and architecture.

The Continuing Rise of Remote Code Execution

There were nearly 29,000 vulnerabilities published in 2023, amounting to over 3,800 more common vulnerabilities and exposures (CVEs) being issued last year than in 2022. More troubling than the sheer volume of vulnerabilities in 2023 is that over half of them were given a CVSS score indicating high or critical severity — an increase of 57% YoY.

Exploring Advanced Tripwire Enterprise Capabilities

In today's digital landscape, it is important for organizations to depend upon the tools they use for cybersecurity. Large businesses can employ many security solutions, practices, and policies that must combine to create a robust and layered security strategy. While many of these tools are important and necessary, organizations often don't use them to their full potential. With any security tool or platform, it is important to understand its features beyond the most basic functions.