From Bounty to Exploit: Observations About Cybercriminal Contests

Credit to Author: David Sancho| Date: Thu, 27 Oct 2022 00:00:00 +0000

From articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this blog, we discuss our takeaways and summarize the results of these contests.

Read more

Addressing Ransomware in Hospitals & Medical Devices

Credit to Author: Ericka Pingol| Date: Wed, 26 Oct 2022 00:00:00 +0000

Ransomware attacks have been on the rise in recent years, and hospitals are increasingly becoming targets. In many cases, these attacks can have devastating consequences, disrupting vital services and putting patients’ lives at risk.

Read more

Threat Actors Target AWS EC2 Workloads to Steal Credentials

Credit to Author: Nitesh Surana| Date: Wed, 26 Oct 2022 00:00:00 +0000

We found malicious samples attempting to steal Amazon Elastic Compute Cloud (EC2) Workloads’ access keys and tokens via typosquatting and the abuse of legitimate tools.

Read more

LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company

Credit to Author: Mohamed Fahmy| Date: Tue, 25 Oct 2022 00:00:00 +0000

Our blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company from an intrusion analysis standpoint

Read more

Top Cloud Security Challenges & How to Beat Them

Credit to Author: Mike Milner| Date: Tue, 25 Oct 2022 00:00:00 +0000

The ongoing shift of traditional IT functions to the cloud brings new cyber risks for enterprises. Discover three current cloud security challenges and how to prevent them from causing financial, operational, and reputational damage.

Read more

Uncovering Security Blind Spots in CNC Machines

Credit to Author: Marco Balduzzi| Date: Mon, 24 Oct 2022 00:00:00 +0000

Industry 4.0 has given rise to smart factories that have markedly improved machining processes, but it has also opened the doors for cybercriminals looking to abuse networked industrial equipment such as CNC machines. Our research investigates potential cyberthreats to CNC machines and how manufacturers can mitigate the associated risks.

Read more

Infographic: How CNAPP Consolidate Cybersecurity Tools

Credit to Author: Michael Langford| Date: Fri, 21 Oct 2022 00:00:00 +0000

A cloud-native application protection platform (CNAPP) consolidates your security tools, helping development, DevOps, cloud, and security teams sort each piece and see the big picture.

Read more

Ransomware Insurance Security Strategies

Credit to Author: Vince Kearns| Date: Thu, 20 Oct 2022 00:00:00 +0000

Ransomware accounts for 75% of all cyber insurance claims yet 40% of business currently lack the coverage needed. Discover how to improve your ransomware prevention strategy to reduce cyber risk and meet insurance requirements.

Read more