Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Stories from the SOC - Sowing the Seeds of Cybercrime: The Credential Harvester

Cyber attackers are constantly innovating new ways to compromise users and steal credentials. Among these techniques, credential harvesting through phishing attempts is one of the most prevalent methods. This deceptive strategy often involves attackers creating a fake site that mirrors a legitimate login page.

Impersonate a Client After Authentication Configuration in Windows

The Impersonate a client after authentication Windows security setting allows a program or service to act on behalf of a user after the user has logged in. This is essential to the running of many applications, from printing and accessing user files in web applications, to the systems service control manager. This ability to temporarily act as another user is also known as impersonation and the application must have the correct security configuration in order to do so.

Rubrik Named Five Times A Leader and Five Times Furthest in Vision: We Believe a Testament to Cyber Resilience

I am proud to announce that Rubrik has been recognized as a leader not just once but five consecutive times – we believe this is a testament to our vision and commitment to cyber resilience. This recognition in the Gartner Magic Quadrant for Enterprise Backup and Recovery Solutions (EBRSS)1 is a significant milestone for us, and it reaffirms our dedication to empowering organizations to navigate the complexities of data security and protect against evolving cyber threats.

Updated SafeBreach Coverage for US CERT Alert AA23-061A - BlackSuit (Royal) Ransomware

On August 7th, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) issued an update to an existing advisory (AA23-061A) highlighting new TTPs being leveraged by the recently rebranded “Royal” ransomware gang – now known as BlackSuit. Detailed information about this threat and the associated IOCs and TTPs can be seen on #StopRansomware: Blacksuit (Royal) Ransomware.

Creating a Secure Community of Interest (COI) for Defence & Industry Information Exchange

The secure exchange of information between the Government, Defence and the supply chain is critical to operational outcomes. A Community of Interest (COI) is often used to facilitate multi-party coordination and collaboration between these parties but is often difficult to implement. Let’s explore the use cases, challenges and tools for creating COIs for secure information exchange.
Featured Post

Why Shadow IT Prevails for UK SMEs

Fuelled by hybrid working models, easy access to cloud services, and the evolution of AI, shadow IT continues to be a pressing issue for UK organisations. Today, business users demand access anywhere at any time using multiple devices, while they expect their confidentiality, integrity and availability to be preserved as if they were in the office.