Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

What is Dark Web Monitoring? Tracking Data Leaks & Breaches

‍Dark web monitoring is the process of tracking your organization’s information on the dark web. Dark web monitoring solutions can scan through billions of pages on the internet to find leaked or stolen information, such as compromised passwords, credentials, intellectual property, and other sensitive data being shared and sold among cybercriminals operating on the dark web.

K-12 schools are struggling with cybersecurity - Here's how a SIEM can help

K-12 school districts in the U.S. are struggling with cybersecurity. According to an October 2022 GAO report, ransomware attacks have cost schools up to three weeks of missed learning. The GAO also noted that recovery can take as long as nine months. In January 2021, 3,000 K-12 public schools in the U.S. were victim to a large-scale worldwide cyberattack.

Common Payloads Attackers Plant in Malicious Software Packages

In this third post in our series on Malicious Software Packages, we’ll focus on the aftermath of a successful attack and how the attacker executes payloads to serve their needs through various real-life scenarios. Before we start, let’s review a few highlights from the second post you might’ve missed: Now, let’s get to blog three in the series.

Network Security 101: A Brief Intro to Securing Networks

We live in a world of rapid technological advancements. Technologies such as big data, the internet of things (IoT) and artificial intelligence have created a world full of opportunities and solutions. However, it has also opened doors to increased threats, cyberattacks and network vulnerabilities. This post will explain network security, including relevant concepts and issues, as well as best practices that can your organizations secure all your networks and surfaces.

Is My Phone Hacked? Here's How You Can Tell and What to Do

In today’s digital world, we rely on our mobile devices to navigate much of our daily lives. Beyond making calls and sending text messages, we use our phones for online shopping, banking, work, personal reminders, photos, videos, and so much more. While this technology offers great possibilities and convenience, it also can put your personal data at risk.

Twitter's New Verified Badge Causes Security Issues

Over the past weeks, Elon Musk’s purchase of Twitter has drawn the attention of people worldwide, even those who are not using the platform. One of many ideas Musk had while purchasing Twitter was to allow users to pay $8 per month and receive the blue check mark. Until this decision, only verified celebrities, companies, and journalists by Twitter, received the mark and it helped fight against fraud and identity theft incidents.

How CrowdStrike Detects Cloud Storage Misconfigurations to Protect Valuable Data

Cloud storage misconfigurations continue to become more prevalent and problematic for organizations as they expand their cloud infrastructure, driving the importance of technologies such as cloud security posture management (CSPM) as crucial tools for protectors everywhere. Consider the recently reported public exposure of data associated with some Microsoft customers and prospects.

Curbing Rampant CEO Fraud in 2022

If it seems like you’re constantly hearing about cybercrime these days, there’s a reason for that. Globally, reports of cyberattack instances increased by a staggering 125% in 2021, a trend that shows no sign of slowing. As businesses and consumers turn their attention to cybercrime and protective measures, enterprising cybercriminals continue to fine-tune their approach to exploiting vulnerabilities. In fact, cybercrime is on track to become the world’s third-largest economy.

Evicting Typosquatters: How CrowdStrike Protects Against Domain Impersonations

Threat actors constantly unleash phishing attacks that use emails or text messages containing domains or URLs, all designed to impersonate well-known companies and trick users into visiting fake websites and entering their logon or other confidential information. Unfortunately, many users fall prey to such attacks, unknowingly giving threat actors access to their work or personal accounts.

Fangxiao: A Phishing Threat Actor

Do you know what “fangxiao” means in simplified Chinese? Before you Google it, let me tell you that it stands for “imitate” and this is exactly what Fangxiao phishing campaign actors try to do – imitate and exploit the reputation of international, trusted brands by promising financial or physical incentives to trick victims into further spreading the campaign through WhatsApp.