Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intelligence

Keep Your Software Update Routine Strong

Software is an essential part of our online experience. Whether it’s our operating systems, web browsers, or the apps we use daily, software plays a crucial role in our lives. However, with great convenience comes a big responsibility, and one of the most essential aspects of online safety is keeping your software updated regularly. In this blog, we’ll explore the significance of keeping your software up-to-date.

Cisco iOS XE Vulnerability: CVE-2023-20198

Cisco has released an advisory, acknowledging active exploitation of a previously unknown vulnerability, which is tracked as CVE-2023-20198, in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access, which is the highest level of access.

The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team

In response to improved email security measures, cybercriminals have pivoted to more advanced attack methods, namely artificial intelligence (AI), that bypass existing protections. But security defenders are also using AI in remarkable new ways to fortify their networks. Join Erich Kron, Security Awareness Advocate for KnowBe4, and Michael Sampson, Principal Analyst at Osterman Research, as they dig into the findings of our latest joint report on The Role of AI in Email Security. They’ll share tips on how your SOC team can identify and use AI to supercharge your anti-phishing defense.

Open-Source Intelligence (OSINT): Learn the Methods Bad Actors Use to Hack Your Organization

They are out there, watching and waiting for an opportunity to strike; the bad actors who have carefully researched your organization in order to set the perfect trap using easily found public resources. Open-Source Intelligence (OSINT) can provide cybercriminals everything they need to know to perfectly target your users by gathering data on everything from password clues to tech stack details, banking/credit card accounts, social media details and more. Emerging technologies like AI can make gathering this intelligence even easier.

Trustwave Threat Intelligence Briefing: The 2023 Financial Services Sector Threat Landscape

Cyberattacks striking the financial services industry are more prevalent, dangerous, and hitting faster than ever. To provide much needed guidance and recommended mitigation measures the elite Trustwave SpiderLabs team conducted a multi-month investigation into the cyber threats facing the financial services sector and released the report 2023 Financial Services Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies.

Strengthening Cybersecurity: The Importance of Multi-Factor Authentication

Safeguarding your own personal digital ecosystem is your responsibility. However, the effectiveness of your organization’s cybersecurity measures heavily relies on the collective efforts of every member in your organization. Inspired by the Cybersecurity Awareness Month (CSAM), it serves as a reminder that individual choices can significantly impact overall cybersecurity.

Fortify Your Security with Passwords and Password Managers

The internet has become an integral part of our daily lives, protecting our online accounts and sensitive information is more critical than ever. Passwords are the first line of defense against cyberattacks, and their strength is essential in safeguarding our identities. In this blog post, we’ll cover passwords and password managers, exploring the significance of strong passwords and the role that password managers play in enhancing our online security.

Stay Secure: Your Guide to Cybersecurity Awareness Month 2023

October has arrived, and with it comes one of the most crucial awareness campaigns in the digital age: Cybersecurity Awareness Month (CSAM). As we navigate an ever-changing and technologically advanced world, protecting our online presence has never been more vital. This month, we’ll dig into the four CSAM themes to help you fortify your digital defenses and safeguard your online identity. Stay tuned as we give tips that anyone in your family can follow, even mom!

WatchGuard Threat Lab Report Finds Endpoint Malware Volumes Decreasing Despite Campaigns Growing More Expansive

Key findings from the research also show a rise in double-extortion attacks, self-managed websites targeted for malware delivery, threat actors continuing to exploit older software vulnerabilities, and more.