Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

85% of Organizations Have Experienced At Least One Ransomware Attack in the Last Year

Ransomware attacks are as pervasive as ever, with new data demonstrating just how impactful the attacks really are. If you’re one of the lucky few organizations that hasn’t fallen victim to a ransomware attack, consider yourself lucky. According to the 2023 Ransomware Trends Report from backup vendor Veeam, the vast majority of organizations (85%) have experienced a ransomware attack. And while that number is pretty shocking, that’s not the worst of it.

Cracking the Code of AI Decision Making: Harnessing the Power of SHAP Values

Despite the race to integrate artificial intelligence (AI) and machine learning (ML) into business systems and processes, the crucial issue of comprehending and articulating the decision-making process of these models is often ignored. Although machine learning is a valuable tool for uncovering pertinent information from vast amounts of data, it is essential to ensure the relevance, accuracy and reliability of this information.

Torq is an inaugural WIZ Integration (WIN) Launch Partner

Torq has been hand selected as a Wiz Integration (WIN) launch partner, bringing the power of Torq Hyperautomation to WIN, so that our joint customers can continue to seamlessly integrate Wiz into their workflows, empowering them to automate their response. WIN enables Torq to deliver actionable remediation and response to threats with a full audit trail of automated security actions.

Mass Exploitation of MOVEit Transfer Critical Vulnerability - Recommended Mitigations and How Forescout Can Help

On May 31, Forescout Research – Vedere Labs uncovered a significant incident where threat actors exploited a critical zero-day vulnerability in the MOVEit Transfer software, which resulted in unauthorized access to and exfiltration of private data, as well as privilege escalation. MOVEit Transfer is a widely adopted managed file transfer (MFT) solution that enables organizations to securely exchange files with their business partners and customers.

Modify Mailbox Settings Via the Set-Mailbox Cmdlet

The Exchange Administration Center (EAC) is an easy-to-use interface for managing Exchange. However, it enable you to change only a handful of mailbox settings, and you can modify only one mailbox at a time. For more comprehensive management, you turn to Microsoft PowerShell (or, to be exact, Exchange Management Shell).

Shielding Against the Most Recent Fortinet Vulnerability

During a red team assessment for a client, Charles Fol and Dany Bach from LEXFO, discovered a heap overflow bug in Fortigate’s SSL VPN that can be exploited to achieve remote code execution on Fortigate instances. This vulnerability is reachable without authentication, and can be used to execute arbitrary code on vulnerable systems, which could lead to a complete compromise of the system.

Random but Memorable - Episode 11.0: Fancy Bear Grunge Nostalgia with Scott J. Shapiro

It’s the final episode of the season! Join us for one last action-packed show as we break down all the latest security news in Watchtower Weekly and get nostalgic with a 90s-themed game of Play Your Passwords Right. 💿��🎮🎶 We’re also lucky enough to be joined by Scott J. Shapiro, author of the latest cybersecurity true-crime novel Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. Tune in to find out more about some of history’s most astonishing cyberattacks and what we can learn from them.