Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Insights on the MOVEit File Transfer Vulnerability
Exploits & Vulnerabilities

Insights on the MOVEit File Transfer Vulnerability

Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back.

June 16, 2023
Ransomware

Tailing Big Head Ransomware’s Variants, Tactics, and Impact

We analyze the technical details of a new ransomware family named Big Head. In this entry, we discuss the Big Head ransomware’s similarities and distinct markers that add more technical details to initial reports on the ransomware.

Jul 07, 2023

Save to Folio

Jul 07, 2023

Save to Folio

Compliance & Risks

Four Must-haves to Strengthen Your Endpoint Security

To combat complexity and achieve optimal security outcomes, there are four key factors an organization should consider when evaluating their endpoint security.

Security Strategies Jul 06, 2023

Save to Folio

Security Strategies Jul 06, 2023

Save to Folio

Privacy & Risks

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organizations and individual users. However, its latest feature, known as Shared Links, comes with the potential risk of unintentional disclosure of confidential information.

Security Strategies Jul 05, 2023

Save to Folio

Security Strategies Jul 05, 2023

Save to Folio

Malware

Malvertising Used as Entry Vector for BlackCat, Actors Also Leverage SpyBoy Terminator

We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that this activity led to a BlackCat (aka ALPHV) infection, and actors also used SpyBoy, a terminator that tampers with protection provided by agents.

Research Jun 30, 2023

Save to Folio

Research Jun 30, 2023

Save to Folio

Exploits & Vulnerabilities

Human vs Machine Identity Risk Management

In today's business world's dynamic and ever-changing digital landscape, organizations encounter escalating security challenges that demand a more business-friendly and pertinent approach.

Reports Jun 29, 2023

Save to Folio

Reports Jun 29, 2023

Save to Folio

Ransomware

An Overview of the Different Versions of the Trigona Ransomware

The Trigona ransomware is a relatively new ransomware family that began activities around late October 2022 — although samples of it existed as early as June 2022. Since then, Trigona’s operators have remained highly active, and in fact have been continuously updating their ransomware binaries.

Research Jun 23, 2023

Save to Folio

Research Jun 23, 2023

Save to Folio

Exploits & Vulnerabilities

MOVEit Vulnerability Breaches Targeted Fed Agencies

Jon Clay and Ed Cabrera talk about the MOVEit breaches and more in the video series #TrendTalksBizSec

#LetsTalk Series Jun 21, 2023

Save to Folio

#LetsTalk Series Jun 21, 2023

Save to Folio

Cloud

Gaps in Azure Service Fabric’s Security Call for User Vigilance

In this blog post, we discuss different configuration scenarios that may lead to security issues with Azure Service Fabric, a distributed platform for deploying, managing, and scaling microservices and container applications.

Latest News Jun 21, 2023

Save to Folio

Latest News Jun 21, 2023

Save to Folio