Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Accelerated Response to a High-Profile Data Breach

A leading insurance and asset management company was hit by a large-scale data breach, impacting more than four million customer and employee records and resulting in widespread media attention. Through an accelerated response with emergency call center support, a dedicated support website and expedited notice mailing, Kroll’s Breach Notification services ensured the business was able to take quick and decisive action following this globally significant security event.

Continuous Penetration Testing: How to Mature Your Approach to Assessments

As cyber threats grow more sophisticated and persistent, traditional penetration testing methods, often conducted quarterly or annually, can miss key vulnerabilities and lack coverage. Continuous penetration testing enables organizations to identify and remediate vulnerabilities in real time, providing product and software teams with up-to-date insight and evidence to advance security and enhance regulatory compliance.

Let Data Be Your Guide: The Value of Data Security Posture Management in the Zero Trust Journey

Which is the best aspect to focus on first: network or identity? That’s a question many organizations ask when planning their Zero Trust journey. While both are key pillars to address in a Zero Trust journey, the overarching approach should be to start with your data and let that data be your guide. Data Security Posture Management (DSPM) plays a unique role in enabling businesses to achieve this thanks to its capacity for identifying potentially insecure combinations of identity, access and data.

New AMOS Infection Vector Highlights Risks around AI Adoption

During a recent investigation into AMOS InfoStealer, Kroll Threat Intelligence Team has discovered a troubling new delivery vector that leverages the growing trust users place in AI tools. In this case, attackers leveraged ChatGPT as the source of guidance, tricking victims into initiating the infection, presenting it as a legitimate solution to a common technical problem. Victims were tricked into believing they were running a harmless command to fix a sound issue on their Mac device.

Paying the Price: Enhancing the Retail Sector's Resilience to Scattered Spider and Cl0p

This is the second in our Retail Resilience series. Check out the first article, Cyber Risk in UK Retail: A Golden Quarter Under Threat Threat actors have retail firmly in their sights. High profile breaches across giants, from Cartier, Co-op and Adidas to Marks & Spencer, underscore just how much is at stake. With sprawling customer data, complex supply chains and relentless digital transformation, the sector is a prime target for sophisticated threat groups.