Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Asset Importance: The Overlooked Factor in Cyber Risk Prioritization

This blog post delves into a critical yet often neglected aspect of cyber risk analysis —adding organizational context by understanding and prioritizing the importance of assets. Without considering the unique business context of an organization, security teams cannot effectively prioritize and remediate what matters most to their organization.

CVE-2024-1709 & CVE-2024-1708: Follow-Up: Active Exploitation and PoCs Observed for Critical ScreenConnect Vulnerabilities

On February 20, 2024, we published a security bulletin detailing newly disclosed authentication bypass and path traversal vulnerabilities in ConnectWise ScreenConnect. Shortly after the bulletin was sent, ConnectWise updated their security bulletin with IOCs from observed active exploitation of these vulnerabilities. On February 21, 2024, the vulnerabilities were assigned the following CVE numbers.

Operation Cronos: The Takedown of LockBit Ransomware Group

On February 20, 2024, the National Crime Agency (NCA) of Britain and the Federal Bureau of Investigation (FBI) announced the successful disruption of the Lockbit ransomware gang, marking a significant milestone in the fight against cybercrime. This operation, known as Operation Cronos, was a collaborative effort involving law enforcement agencies from the UK, the US, and several other countries, with support from private sector partners.

Is It Safe to Text a Password?

No, it is not safe to text a password because text messages are not encrypted. This means anyone can intercept the data being sent through texts, including passwords, placing your accounts at risk of becoming compromised. Continue reading to learn more about password-sharing practices to avoid and how you can share passwords safely with friends, family and colleagues.

Deepfakes vs. Digital Verification: India's eKYC at a Crossroads

In an era where artificial intelligence (AI) crafts indistinguishably realistic deepfakes, India stands at a critical juncture, facing the formidable task of defending its digital domain. These AI-generated forgeries, capable of impersonating individuals with frightening accuracy, pose not just a threat to personal privacy but also to national security, misinformation control, and the integrity of digital transactions.

Unlocking the Future: The Digital ID Revolution in 2024 and Beyond

In the dawn of 2024, the digital landscape is undergoing a profound transformation as digital identity solutions redefine the way we perceive and interact with our identities. This revolution promises a future where our smartphones serve as gateways to our entire identities, offering unparalleled convenience and security.

Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk

A cybersecurity vendor questionnaire is vital in assessing the competency and reliability of potential partners. It serves as a comprehensive tool to evaluate various aspects crucial for safeguarding sensitive data and infrastructure. Through detailed inquiries about security protocols, compliance measures, incident response plans, and past breach incidents, the questionnaire helps gauge the vendor’s commitment to robust cybersecurity practices.

Beating LockBit at its Own Game: Law enforcement's takedown of a prolific ransomware group

After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit. Law enforcement additionally arrested LockBit associates in Poland, Ukraine, and the U.S. and the U.S. Treasury imposed sanctions on Russian nationals affiliated with the group. The joint operation re-engineered LockBit’s online system to mimic the countdown clock used by the group in its extortion attempts.

3 2 1... Impact! Early Results under the SEC's Cybersecurity Governance Rule

In July 2023, the SEC adopted a new rule requiring disclosure of “material” cybersecurity incidents and detailed information on cybersecurity risk management, strategy and governance by public companies. With the new rule taking effect in December and annual reports due for public release and consumption in the first few months 2024, companies are scrambling to closely review and hone their cyber programs to address these new reporting requirements.