TargetCompany Ransomware Abuses FUD Obfuscator Packers

Credit to Author: Don Ovid Ladores| Date: Mon, 07 Aug 2023 00:00:00 +0000

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

Read more

Break IT/OT Silos by Expanding SOC Responsibilities

Credit to Author: Kazuhisa Tagaya| Date: Fri, 04 Aug 2023 00:00:00 +0000

The latest study said that enterprise SOCs are expanding their responsibilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks.

Read more

New SEC Cybersecurity Rules: What You Need to Know

Credit to Author: Greg Young| Date: Thu, 03 Aug 2023 00:00:00 +0000

The US Securities and Exchange Commission (SEC) recently adopted rules regarding mandatory cybersecurity disclosure. Explore what this announcement means for you and your organization.

Read more

How to Leverage the AWS Cost Optimization Pillar

Credit to Author: Melissa Clow| Date: Tue, 01 Aug 2023 00:00:00 +0000

Explore the Cost Optimization pillar of the AWS Well-Architected Framework and gain best practices for designing processes that make it possible to go to market and optimize costs early on.

Read more

4 Generative AI Security Benefits

Credit to Author: Jon Clay| Date: Tue, 01 Aug 2023 00:00:00 +0000

It may be some time before generative AI security can autonomously mitigate cyber threats, but we’re already seeing early examples of how AI models can strengthen enterprise cybersecurity in powerful and transformative ways.

Read more