September 22, 2022

Held to Ransom: How Cyberattacks Can Become a Legal and Regulatory Odyssey for a Private Investment Fund

About Proskauer Rose LLP We are 800+ lawyers serving clients from offices located in the leading financial and business centers in the Americas, Europe and Asia. The world’s leading organizations, companies and corporations choose us to be their representatives in their most critical situations. Moreover, they consider Proskauer a strategic partner to drive their business …

Held to Ransom: How Cyberattacks Can Become a Legal and Regulatory Odyssey for a Private Investment Fund Read More »

DDoS Threat Intelligence Report Reveals Troubling Attacker Behavior in 1H 2022

If there is one consistent quality shared by all cybercriminals, it’s that they never fail to innovate to get at what they want, whether it’s to spy; spread mayhem, or access sensitive corporate data, personal information, or lucrative financial details.  This certainly holds true for our findings in the newest DDoS Threat Intelligence Report, which …

DDoS Threat Intelligence Report Reveals Troubling Attacker Behavior in 1H 2022 Read More »

Atomicorp and Atomic OSSEC 7.0: What’s New in 2022

It’s been a busy year at Atomicorp, and we’re proud to announce some of the fruits of our information security and compliance solution labors, including a new and enhanced version of our flagship endpoint and cloud workload protection solution, Atomic OSSEC, which delivers FIM and comprehensive PCI DSS controls.  Atomic OSSEC version 7.0 brings an …

Atomicorp and Atomic OSSEC 7.0: What’s New in 2022 Read More »

BlackCat Ransomware Improved Data Output and Steal Veeam Passwords

When analyzing the BlackCat / ALPHV ransomware attacks in August, Symantec experts (those who went under the wing of Broadcom) discovered a new, more secretive version of the Exmatter data exfiltration tool. Observers also noted the use of additional malware – the Eamfo infostealer, which can steal credentials saved with Veeam. Cross-platform malware BlackCat, which …

BlackCat Ransomware Improved Data Output and Steal Veeam Passwords Read More »

What Is Graph Technology? What Can It Do?

Graph technology can help examine your data from a new perspective. Find out how graph technology may find previously unseen relationships in your data. What Is Graph Technology? Graph technology includes graph theory, graph analytics, and graph data management. Graph technology has a different perspective than most existing solutions by mapping complex datasets. Graph technology …

What Is Graph Technology? What Can It Do? Read More »

SATAn Targets Air-Gapped Computers with Data Theft, Spying

If you think that the best way to protect data is to keep it off the network, you are not alone. Indeed, organizations responsible for protecting highly sensitive data sometimes use a technique known as “air-gapping.” As noted by TechRepublic, air-gapping involves isolating a computer by removing/disallowing a network connection. The logic is that air-gapping …

SATAn Targets Air-Gapped Computers with Data Theft, Spying Read More »

See What’s New in Riverbed SaaS Accelerator Release 1.5.1

Starting SaaS Accelerator release 1.5.1, Riverbed has introduced support for Microsoft’s CASB solution, the Microsoft Defender for Cloud Apps, as well as Azure Information Protection (AIP). Quick introduction to CASBs and Microsoft Defender for Cloud Apps Before getting started with the details of Microsoft Defender support in Riverbed SaaS Accelerator, here is a brief overview …

See What’s New in Riverbed SaaS Accelerator Release 1.5.1 Read More »

See What’s New in Riverbed SaaS Accelerator Release 1.5.1

Starting SaaS Accelerator release 1.5.1, Riverbed has introduced support for Microsoft’s CASB solution, the Microsoft Defender for Cloud Apps, as well as Azure Information Protection (AIP). Quick introduction to CASBs and Microsoft Defender for Cloud Apps Before getting started with the details of Microsoft Defender support in Riverbed SaaS Accelerator, here is a brief overview …

See What’s New in Riverbed SaaS Accelerator Release 1.5.1 Read More »

How to Prevent Ransomware & Protect Your Business | Nettitude

  When a ransomware attack hits, time is of the essence to limit the impact on your organisation’s operations. It has been said that prior preparation and planning prevents poor performance, helping with time management and ensuring that tasks are completed most efficiently. The threat from ransomware continues to develop significantly. Previously, one or two …

How to Prevent Ransomware & Protect Your Business | Nettitude Read More »

Monthly Threat Actor Group Intelligence Report, July 2022 (ENG)

#top .av-special-heading.av-knywxz-414f855f58e6390efbe7372e587c2536{ padding-bottom:10px; } body .av-special-heading.av-knywxz-414f855f58e6390efbe7372e587c2536 .av-special-heading-tag .heading-char{ font-size:25px; } .av-special-heading.av-knywxz-414f855f58e6390efbe7372e587c2536 .av-subheading{ font-size:15px; } Monthly Threat Actor Group Intelligence Report, July 2022 (ENG) This report is a summary of Threat Actor group activities analyzed by NSHC ThreatRecon team based on data and information collected from 21 June 2022 to 20 July 2022. In July, activities …

Monthly Threat Actor Group Intelligence Report, July 2022 (ENG) Read More »

Healthcare Industry Leads the Way in Fixing Software Flaws

The healthcare industry is transforming patient care through software, from 24/7 digital patient portals, to AI-fueled medical research, and everything in between. As innovation reaches new heights, how does healthcare stack up against other sectors in terms of software security flaws and the ability to remediate them? Our latest State of Software Security Report found that 77 …

Healthcare Industry Leads the Way in Fixing Software Flaws Read More »

You can’t stop me. MS Teams session hijacking and bypass

Blog: Vulnerability Advisory How cleartext session tokens are stored in an unsecured directory that can be stolen and used to impersonate a Teams user. TL;DR Microsoft Teams stores unencrypted session tokens and cached conversations in users’ roaming AppData, which can be used by an attacker to gain access to the victim’s Teams account without having …

You can’t stop me. MS Teams session hijacking and bypass Read More »

Virtualization Security Just Got Easier

Troubleshooting is never easy, but having to work through firewall issues also makes the process much more involved. That’s especially true if you have to bring in multiple people from multiple disciplines—and let’s not get started on having to request a configuration change. The VMware NSX distributed firewall (DFW) makes this entire process much more …

Virtualization Security Just Got Easier Read More »

NEW SANS DFIR COURSE IN DEVELOPMENT | FOR577: LINUX Incident Response & Analysis

FOR MORE INFORMATION ABOUT THIS COURSE REGISTER FOR UPDATES HERE Linux powers a vast range of business-critical systems across the globe. From webservers to database platforms, to network hardware to security appliances, Linux can often be found “under the hood” making sure the system just keeps working. Authored by SANS Instructor Tarot (Taz) Wake, the new …

NEW SANS DFIR COURSE IN DEVELOPMENT | FOR577: LINUX Incident Response & Analysis Read More »

Chinese State-Sponsored Group TA413 Adopts New Capabilities in Pursuit of Tibetan Targets

Editors Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF. This report details multiple campaigns conducted by the likely Chinese state-sponsored threat activity group TA413. The activity was identified through a combination of large-scale automated network traffic analytics and …

Chinese State-Sponsored Group TA413 Adopts New Capabilities in Pursuit of Tibetan Targets Read More »