Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

FBI Releases Blackcat Ransomware Decryption Tool to Victims, Disrupting Attacks

For the first time ever, the U.S. Justice Department announced the existence of an FBI-developed decryption tool that has been used to save hundreds of victim organizations attacked by one of the most prolific ransomware variants in the world. In an announcement made last month, the Justice Department made the world aware of the existence of a decryption tool to be used by those organizations hit by Blackcat – also known as ALPHV or Noberus.

How to Reduce Your Attack Surface

An attack surface is the total number of channels, pathways, or areas that threat actors can utilize to gain unauthorized access to networks. The result is that they can obtain private information or carry out a cyber-attack. An attack surface comprises the organizational assets a threat actor can exploit to gain unauthorized access. Attack surfaces include systems that are directly involved in mission-critical operations, as well as those that provide peripheral services or access to important data.

There was a cyberattack every 39 seconds in 2023

Cyberattacks continue to be a cause for concern for businesses. Although great strides have been made to combat this issue, the ability of threat actors to adapt, combined with other factors such as the rise in remote working or the increase in the number of devices with Internet access, means that cybercrime persists. According to a study by Cybersecurity Ventures, a cyberattack took place every 39 seconds in 2023, which translates into over 2,200 cases per day.

Ghost in the Web Shell: Introducing ShellSweep

In the cyber realm, where digital defense and offense is an ongoing game of cat and mouse, one of the most potent weapons in an attacker's arsenal is the web shell. A seemingly innocuous piece of code that, once embedded in a server, allows an attacker to maintain their access and control. The hidden danger of web shells is their stealthiness and versatility, making them a challenging threat to uncover and neutralize.

Phishing Reigns as the Most Likely and Most Feared Cyber Attack

With over half of organizations being the victim of password-based attacks in the last year, new data sheds light on the risk of phishing attacks and the use of password-based credentials. If you don’t think credentials are a key element in cyber attacks, I refer you back to an article of mine from the middle of last year where 15 billion (with a ‘b’) credentials are on sale on the dark web.

3 Steps Government Policymakers Can Take to Reduce Critical Infrastructure Cyber Attacks

Recent research identifying nearly 100,000 exposed industrial control systems (ICS) around the world should serve as a critical wake-up call to national government policymakers responsible for ensuring national security, public health, and safety within their borders. These systems, fundamental to our critical infrastructure, underpin essential services that sustain modern society… and they should not be publicly exposed on the Internet!

The Future of Cloud Security: Attack Paths and Graph-based Technology

Learn about the power of leveraging graph-based cloud security technology to improve cloud security teams' ability to navigate and assess critical risks in multi-cloud environments. This whitepaper reveals why modern security teams are turning towards graph-based technology to accurately discover and prioritize cloud risks. Understand the nuances, benefits, and the need for a graph-driven approach alongside attack path analysis capabilities, to better secure multi-cloud ecosystems.

7 ways to protect remote employees from a cyberattack

Working from home (WFH) has brought with it advantages such as flexibility and access to global talent, but it has also introduced new security threats to organizations. The shift to a remote or hybrid workforce has forced companies to adopt more software-as-a-service (SaaS) applications, which has caused almost 40% of companies to lose control of their IT and security environments, according to data from a Cloudflare study.