Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Update DoubleZero Destructor

The Splunk Threat Research Team is actively monitoring the emergence of new threats in the cyber domain of ongoing geopolitical events. As we have shown previously in several releases, including HermeticWiper and CaddyWiper, actors in this campaign are deploying, updating, and modifying stealthier malicious payloads. On March 17th, 2022, the Ukraine CERT discovered a new malicious payload named DoubleZero Destructor (CERT-UA #4243).

Working with At-Risk Businesses: How It Can Dismantle Your Zero Trust Strategy

Nowadays, building a zero-trust network has become a standard protocol in the era of evolving business models, multiple workforce platforms, cloud adoption, and increased device connectivity. But, if a business continues to work with at-risk organizations, the zero-trust policy crumbles. Working with well-secured third parties that uphold a zero-trust strategy is crucial for optimal cybersecurity within any business.

Threat-Based Methodology: Auditing

This is the third post in the Threat-Based Methodology blog series. In the first post, we introduced Threat Based Methodology and the analysis conducted by the FedRAMP PMO and NIST. In that post, we ended by listing the top seven controls based on their Protection Value. The second post explored configuration settings in greater depth and explained how Devo supports the ability to meet the CM-6 control.

Identity Protection Solution

80% of modern attacks are identity-driven, leveraging stolen credentials. Existing endpoint-only security solutions are simply not designed to protect against these attacks. Learn how CrowdStrike Identity Protection - fully integrated with the CrowdStrike Falcon Platform - helps ensure comprehensive protection against identity-based attacks in real-time.

How to Create a Business Continuity Plan

To remain competitive in today's market, businesses in all industries must maintain strict production regulations to decrease downtime and critical errors that could negatively impact their reputations. Organizations can't afford to wait until an event occurs to devise a problem-solving strategy. Your business provides critical products or services to its customers. Any interruption in that service could mean that your customers will seek ways to meet their needs elsewhere.

Mobile penetration testing: Why You Need A Mobile Penetration Test | Cyphere

As mobile devices become more and more ubiquitous, the risk of data theft and malicious attacks also rises. That's why it's important to have a mobile penetration test - an assessment of your system's security that identifies vulnerabilities that could be exploited by cybercriminals. Watch this video to learn more about mobile penetration testing and how it can protect your business from harm.#mobilepenetrationtesting #mobilepentesting

Mind your Single Sign-On (SSO) logs

The news that hacking group Lapsus$ gained unauthorized access to Single Sign-On (SSO) provider Okta through a third-party support account sent chills through information security professionals everywhere. Organizations have adopted SSO identity providers to enable a modern workforce that is increasingly reliant on secure access to cloud-hosted applications to perform critical business functions.