Of all the tactics that an adversary will take on in their campaign, none will be more widely abused than, Execution (https://attack.mitre.org/wiki/Execution). When taking into consideration off-the-shelf malware, traditional ransomware, or state of the art advanced persistent threat actors, all of them have execution in common. There’s a great quote from Alissa Torres which says, “Malware can hide, but it must run.”
In an examination of remote work done by the American Psychological Association, experts found, unsurprisingly, that one of the biggest challenges people face when working remotely is professional and personal isolation. More surprisingly, however, these same experts found that isolation could be eased by the perception of closeness created primarily through communication, collaboration and a sense of shared identity.
By nature, APIs are meant to be used. Even if all of your users are internal, security problems can still arise. To help with this, we've assembled a list of best practices to keep in mind when securing and locking-down an API or web service.
With the number of insider-related breaches rising every year, employee monitoring is becoming a common practice. Modern employee monitoring solutions help businesses track their employees’ productivity and work attendance, minimize administrative work, and enhance cybersecurity. In this article, we discuss why you should monitor your office staff, list the benefits and shortcomings of doing so, and explore best practices for monitoring your employees efficiently yet respectfully.
The year 2020 has left many people feeling like we are living in the twilight zone as the coronavirus sweeps the globe, changing life as most know it. From embracing the reality of a fully remote workforce, to dealing with ruthless cyber attackers taking advantage of unsuspecting people looking for help, and like all things, technology is playing a pivotal role in the way the pandemic plays out.
In casual conversation, threats, vulnerabilities, and risks are often talked about interchangeably. The reality is that the three are quite different. Threats represent something that might happen. Vulnerabilities show that systems have inherent weaknesses attackers may exploit. Risks keep business owners up at night by shining a light on potential harm inherent in running an enterprise.
AT&T Alien Labs® Open Threat Exchange® (OTX) recently created a pulse for a new threat entitled the RIG Exploit Kit which had been observed distributing ransomware to victim companies across a variety of industry verticals. This exploit was discovered by BroadAnalysis who outlined the exploit’s intricacies in a whitepaper that was released December 2, 2019.