Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Can FIM Protect Against Insider Threats

An insider threat is someone inside an organization – including current and former employees, partners, and contractors – who, intentionally or otherwise, put their organization at risk. They typically abuse their access to private information and privileged accounts to steal or sabotage sensitive data, often for financial gain or even revenge. Organizations today must have effective security solutions in place to identify and respond to insider threats.

SIM swapping, an ongoing threat

Although SIM swap scams or SIM swapping have been around for a number of years, it’s hard to pinpoint exactly when they first appeared. An ENISA report states that as early as April 2016, the British media reported an incident of bank account theft using this technique. In the United States, the first documented case of large-scale SIM swapping was the Joel Ortiz case in 2018.

Hackers Phish Finance Organizations Using Trojanized Minesweeper Clone

In a concerning development, hackers are leveraging a Python clone of Microsoft’s iconic Minesweeper game to target financial organizations across Europe and the United States. This novel approach involves concealing malicious scripts within the game code, posing a significant challenge to enterprise risk management and endpoint security. As organizations grapple with these evolving threats, Foresiet remains steadfast in its commitment to providing cutting-edge cybersecurity solutions.

New Transparent Phishing Attacks Leverage Cloudflare Worker Serverless Computing

An increasing number of phishing campaigns from several threat groups are being tracked as they leverage legitimate Cloudflare services as part of account compromise attacks. Security analysts at Netskope take an expository look at the misuse of Cloudflare services for the purpose of enabling phishing attacks that leverage HTML Smuggling and Transparent Phishing tactics. We’ve seen HTML Smuggling attacks for several years, including its continued use this year.

Understanding and Mitigating Snowflake Data Risks Amid Increased Cyber Threat Activity

In today's digital landscape, data security is more crucial than ever. Recently, Snowflake, a leading cloud data platform, has observed a significant uptick in cyber threat activity targeting some of its customers' accounts. This development has prompted an in-depth investigation to understand and mitigate these risks.

Check Point Vulnerability: CVE-2024-24919

On May 28, 2024, Check Point released an advisory for CVE-2024-24919, a high priority bug which according to NIST NVD is categorized as “Exposure of Sensitive Information to an Unauthorized Actor”. The NVD has yet to assess a CVSS score for CVE-2024-24919 as of this writing. This vulnerability affects Check Point Security Gateway devices connected to the internet and configured with either IP-Sec VPN or Mobile Access software blades.

911 S5 Botnet Operation Disruption Highlights the Need for MDR and Email Security

A major botnet operation that controlled an estimated 19 million IP addresses and was responsible for $99 million in illegal gains was shut down this week, and an international law enforcement operation arrested its primary operator. Botnet operations may not be as top of mind as ransomware, but these attacks are still responsible for millions in losses and pose a massive threat to businesses and consumers.

Cyber Exterminators: Monitoring the Shop Floor with OT Security

Pressure is increasing on manufacturers to monitor their shop floors for malicious activity to avoid creating major disruptions in the supply chain. One key security defensive tool for monitoring network-connected devices in a manufacturing environment is Operational Technology Security or just OT. Let’s look at what OT is and how it can detect malicious activity.

Protecto Unveils Enhanced Capabilities to Enable HIPAA-Compliant Data for Generative AI Applications in Snowflake

San Francisco, CA - Protecto, a leading innovator in data privacy and security solutions, is proud to announce the release of new capabilities designed to identify and cleanse Protected Health Information (PHI) data from structured and unstructured datasets, facilitating the creation of safe and compliant data for Generative AI (GenAI) applications. This advancement underscores Protecto's commitment to data security and compliance while empowering organizations to harness the full potential of GenAI.