Tick APT Targeted High-Value Customers of East Asian Data-Loss Prevention CompanyA cyberespionage actor known as Tick has been attributed with high confidence to a compromise of...
Day: March 15, 2023
The Different Methods and Stages of Penetration Testing
The Different Methods and Stages of Penetration TestingThe stakes could not be higher for cyber defenders. With the vast amounts of sensitive information, intellectual property, and...
New Cryptojacking Operation Targeting Kubernetes Clusters for Dero Mining
New Cryptojacking Operation Targeting Kubernetes Clusters for Dero MiningCybersecurity researchers have discovered the first-ever illicit cryptocurrency mining campaign used to mint Dero since the start of...
YoroTrooper Stealing Credentials and Information from Government and Energy Organizations
YoroTrooper Stealing Credentials and Information from Government and Energy OrganizationsA previously undocumented threat actor dubbed YoroTrooper has been targeting government, energy, and international organizations across Europe as part...
Palo Alto Networks Uses Machine Learning to Reduce SASE Costs
Palo Alto Networks Uses Machine Learning to Reduce SASE Costs Palo Alto Networks today revealed it is using artificial intelligence to automate the management of its...
Raising Awareness of Connected Device Security
Raising Awareness of Connected Device Security October is officially cybersecurity awareness month, originally designated back in 2004 by United States President George W. Bush and Congress...
Data Protection Strategy for Resource-Strapped IT Teams
Data Protection Strategy for Resource-Strapped IT TeamsIT teams are increasingly asked to do more with less. With the right data protection strategy in place and strategic...
Protecting Your Organization’s Digital Identity: A Guide to Managed Attribution
Protecting Your Organization’s Digital Identity: A Guide to Managed AttributionManaged attribution has become a powerful technique for organizations to gather intelligence and protect themselves from cyber...
(Ab)using Adobe Acrobat Sign to distribute malware
(Ab)using Adobe Acrobat Sign to distribute malware Bad actors have been distributing malware through email for decades. Over time, security technology has evolved and improved greatly,...
Cyber Risk Quantification based on the MITRE ATT&CK® Framework
Cyber Risk Quantification based on the MITRE ATT&CK® FrameworkArticles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Cyber Risk Quantification based...
How to Handle Secrets in Jenkins
How to Handle Secrets in JenkinsDevOps engineers must handle secrets with care. In this series, we summarize best practices for leveraging secrets with your everyday tools....
Unpacking the National Cybersecurity Strategy: Part 1
Unpacking the National Cybersecurity Strategy: Part 1Leverage this expert analysis to better understand, prepare for, and operationalize the overarching themes and initiatives presented by the National...