Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Kroll

10 Essential Cyber Security Controls for Increased Resilience (and Better Cyber Insurance ...

While threat actors continue to vary attack methods, these 10 essential cyber security controls can significantly improve your security posture, therefore making it harder for cyber criminals to compromise your network and increasing your opportunities for cyber insurance coverage.

Tracking Exchange Online Powershell Access Into Microsoft 365 Environments

Most users are familiar with Microsoft Exchange Online only as an application for accessing their email inboxes. However, by default, all users also have access to a system called Exchange Online PowerShell. This feature, designed primarily to assist IT administrators, allows a user to programmatically perform actions on a Microsoft 365 (M365) tenant. The specific actions a user can perform depend entirely on the user’s assigned roles.

Lunch & Learn: Navigating Increased Transactional Risk Scrutiny

The list and severity of risks that can affect a transaction continue to grow, with cyber becoming an alarmingly difficult challenge for firms of all sizes. With tighter scrutiny around Regulations S-P and S-ID, a variety of disclosure obligations and new encrypted messaging apps, conducting proper cyber due diligence is imperative. However, will cyber diligence slow the deal? What are the implications for taking shortcuts?

Key Takeaways From the NIST Ransomware Risk Management Profile

Ransomware groups have generated so much damage that the United States Federal government has made it a top priority to thwart such efforts including, hosting a major international summit on the topic, setting up a ransomware task force and repeatedly urging organizations to improve their cyber resilience.

Making the Most of Digital Risk Protection in Today's Threat Landscape

Hosted by Kroll and Redscan cyber risk experts, this webinar addressed digital risk protection (DRP) and shared impactful use cases for today’s threat landscape. Often classified as “dark web monitoring,” DRP can be merged with cyber threat intelligence services to not only track threats, but take action against threats happening outside of your network.

Initial Access Brokers: Fueling the Ransomware Threat - The Monitor, Issue 17

Kroll has observed an uptick in actors offering network access on the dark web, particularly in the wake of recent disruptions to the ransomware-as-a-service (RAAS) ecosphere such as the ban on ransomware discussions in notorious underground criminal forums.

Data Exfiltration in Ransomware Attacks: Digital Forensics Primer for Lawyers

Nearly 80 per cent of all ransomware attacks in the first half of 2021 involved the threat of leaking exfiltrated data. Exfiltration is a popular pressure tactic as it introduces the threat to publish stolen sensitive data to a threat actor extortion website if a ransom payment is not received. Our team currently tracks over 40 threat actor extortion websites, with new sites belonging to new ransomware groups emerging each week.