Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Like Father Like Son? New Mars Stealer

First observed in 2021 and advertised as a standalone version on various cybercriminal forums, Mars is an information stealer mainly targeting Windows victim credentials and cryptocurrency wallets including 2FA plugins and any essential system information. Mars is also capable of loading any type of file by downloading and executing them from a given drop-zone. Over the past several months, Mars took the place of a solid info stealer.

Random but Memorable - Episode 8.9: Historically Bad Musical Movie

Today we're joined by 1Password's Director of Security, Adam Caudill (and an unexpected rooster 🐓), to give us a 1Password Basics primer on credential stuffing and how 1Password works to keep you safe online. We also can't peel our eyes away from the recent security news in Watchtower Weekly, but hey, it might get us access to the most prestigious eye-tracking apps – like MoviePass. To top it all off we have a musical-themed round of Ridiculous Requirements, including bonus points for theatrically singing. 🎭

What Is Managed Vulnerability Scanning And Why Do You Need It?

Managed Vulnerability Scanning solves the security problem by providing continuous monitoring and protection for your systems, allowing you to keep up-to-date with new threats. In this video, we'll talk about what Managed Vulnerability Testing is, how it works and why you need it!

2022 Security Trends - Latin America

Hear insights from Rafael Lopez, Associate Managing Director and Head of Kroll’s LATAM Security Risk Management practice, as he shares 2022 security trends for Latin America. Rafael discusses the effect omicron, a COVID-19 variant, will have on logistics companies, supply chain security, organized crime, business travel and social unrest in Latin America.

CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection

As technology continues to evolve rapidly, so do the techniques used by adversaries. This may be considered a given, but it is important to appreciate how attackers may leverage existing and commonly used applications within an environment to attempt to seize control and achieve their objectives.

Why the Most Effective XDR Is Rooted in Endpoint Detection and Response

Extended detection and response (XDR) solutions deliver powerful capabilities to help security teams fight adversaries by increasing visibility, simplifying operations and accelerating identification and remediation across the security stack. XDR platforms gather and aggregate security data from a variety of sources to help detect and contain advanced attacks. But when it comes to efficiently analyzing threat data and quickly identifying the root cause of an incident, not all XDR solutions are alike.

The Foreign Office Hack

The UK’s Foreign Commonwealth and Development office (FCDO) was the target of a “serious cyber security incident”, it has emerged. The BBC understands unidentified hackers got inside the FCDO systems but were detected. This is just the latest in a spate of attacks on government departments in what seems to be an attempt to gain access to sensitive information.

AT&T Cybersecurity Insights Report: A Focus on Healthcare

As healthcare organizations digitally transform themselves to better serve a post-pandemic world, the prevailing goal in the past year has been for them to safely extend health services beyond clinical walls. Be it to power everything from pop-up clinics to telemedicine, this is driving the healthcare technology stack out to the edge.