Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Arctic Wolf

Calculate the Cost of A Data Breach

The worst-case scenario happens: Your organization suffers a data breach. It’s going to take time to clean it up, the business’ reputation may take a hit, and there’s the major issue of cost. How much does cleanup cost? What if it’s a ransomware attack where your organization must pay the ransom? What other specialists will you have to hire—and how much will you need to pay them?

Five Cybersecurity Scams Where Seniors Are Especially Vulnerable

The FBI’s 2021 Elder Fraud Report leads off with a staggering, sobering statistic: adults 60 and over were swindled out of $1.7 billion dollars last year. That’s with a B. Even worse, that marks an increase of 74% year-over-year. Clearly seniors are an attractive target for cybercriminals. Here are five of their favorite ways to target our elders, and what can be done to stop them.

CVE-2022-40684: Critical Remote Authentication Bypass Vulnerability in FortiOS & FortiProxy

Late Thursday, October 6, 2022, Fortinet disclosed a critical remote authentication bypass vulnerability —CVE-2022-40684— impacting FortiOS and FortiProxy. The vulnerability could allow a remote unauthenticated threat actor to obtain access to the administrative interface and perform operations via specially crafted HTTP or HTTPS requests.

Threat Intelligence 101

You can’t protect your system if you don’t know where the vulnerabilities lie or what aspects of your security architecture are being targeted by threats. Intelligence is everything in security — it’s how CISO’s make large-scale operational decisions, how IT teams prioritize projects, and how responders restore and remediate a system during and after an incident.

Updated Guidance for Microsoft Exchange Zero-Day Vulnerabilities Exploited in the Wild

On Wednesday, October 5, 2022, Microsoft published updated mitigation guidance for two zero-day vulnerabilities in Microsoft Exchange Server: CVE-2022-41040 (SSRF vulnerability) and CVE-2022-41082 (RCE vulnerability). Arctic Wolf covered initial assessments on this blog post. Organizations that run Microsoft Exchange on-prem or in a hybrid model should complete both Microsoft provided mitigations to reduce the potential for successful exploitation.

Additional Updated Guidance for Microsoft Exchange Zero-Day Vulnerabilities Exploited in the Wild

Late Wednesday, October 5, 2022, Microsoft published additional updated mitigation guidance for the two zero-day vulnerabilities in Microsoft Exchange Server that were exploited in the wild: CVE-2022-41040 (SSRF vulnerability) and CVE-2022-41082 (RCE vulnerability).

Cybersecurity Awareness Month: Why You Need To Use Strong Passwords

To kids, their Halloween candy stash might as well be a treasure chest. It is their most valuable possession and must remain hidden from pirates … or at least siblings dressed up like pirates. I grew up in a big family. With many kids in the house sharing the same love for Reese’s Peanut Butter Cups, I knew the value of my candy. I knew how important it was to keep it secure. I’d count the pieces multiple times a day.

What Is Cybersecurity Awareness Month (NCSAM)?

Observed each October, National Cybersecurity Awareness Month (NCSAM) was first launched in a collaborative effort between the National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security. Today, it continues to be an important collaboration between government and industry in the months up to and throughout October. Each year focuses on core themes to raise awareness about cybersecurity issues and explain what resources can help.

The Top Cyber Attacks of September 2022

Maybe it’s the changing of the seasons, the start of a new school year, or just something in the air, but September’s cybersecurity landscape was marked with high-energy hacks that seem to have served as twisted amusements for their perpetrators. This month’s round-up is full of criminals who weren’t content just to collect a ransom or sell some private data. These hackers wanted to scorch the earth and hurt their victims with an extra layer of malice and humiliation.