NDR: Not Just a “Nice to Have” Anymore

Credit to Author: Chris LaFleur| Date: Thu, 30 Jan 2025 00:00:00 +0000

Network Detection and Response (NDR) is no longer a ‘nice-to-have’—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Read more

Exposed DeepSeek Database Revealed Chat Prompts and Internal Data

Credit to Author: Lily Hay Newman, Matt Burgess| Date: Wed, 29 Jan 2025 21:34:22 +0000

China-based DeepSeek has exploded in popularity, drawing greater scrutiny. Case in point: Security researchers found more than 1 million records, including user data and API keys, in an open database.

Read more

Infrastructure Laundering: Blending in with the Cloud

Credit to Author: BrianKrebs| Date: Thu, 30 Jan 2025 17:10:08 +0000

In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and Russia increasingly are funneling their operations through major U.S. cloud providers. Research published this week on one such outfit — a sprawling network tied to Chinese organized crime gangs and aptly named “Funnull” — highlights a persistent whac-a-mole problem facing cloud services.

Read more

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response

Credit to Author: Buddy Tancio| Date: Thu, 30 Jan 2025 00:00:00 +0000

The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon.

Read more

ASRM: A New Pillar for Cyber Insurance Underwriting

Credit to Author: Chris LaFleur| Date: Wed, 29 Jan 2025 00:00:00 +0000

ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.

Read more