You are here

Cybersecurity

Security Awareness – Safer Internet Day 2023: How to Manage Your Data and Privacy Online

Today, February 7, 2023, is Safer Internet Day, an awareness day established by the European Union’s SafeBorders project in 2005 and maintained by the Insafe network. Its purpose is to promote awareness of how internet citizens can protect themselves from those attempting to use the internet in a harmful manner.

Supply Chain Risk – Study: 98 Percent of Organizations Hire At Least One Third Party That’s Recently Suffered a Data Breach

Help Net Security has written an article covering a recently released study by SecurityScorecard and the Cyentia Institute on supply chain/third and fourth party risk. The report found that 98 percent of organizations have hired a vendor that has experienced a data breach in the last two years and that 50 percent of organizations have hired a third party that depends on a vendor that has experienced a data breach in the last two years. Compared to the primary organizations surveyed, third parties were found to be five times more likely to demonstrate poor security.

Security Awareness – How to Shift Employee Thinking to Become Security-Focused

Dark Reading has written an article discussing how we can encourage employees to shift their mindset to become more security focused when online. The author argues that cybersecurity legislation, while critical to universally raising the bar for security, also contributes to a culture of security theater. Instead, they offer three ways that personnel can change their thinking and behaviors regarding security activities. The first is to teach employees the fundamental value of data to other organizations, helping them understand the significance of their actions online.

Ransomware Resilience – Proactive Defense Against Ransomware is to Protect Against Behaviors, not Indicators

With ransomware running rampant, pardon the cliché, it’s only a matter of time before many more organizations fall victim to this money-grubbing menace. Recently, Microsoft tweeted about the more than 100 threat actors using ransomware that its tracking in attacks across over 50 unique active ransomware families, including LockBit, BlackCat (ALPHV), and Play, to name a few. While phishing is still a threat actor fan favorite, it’s not the only technique in town.

Action Recommended: Check if your On-Prem or Hybrid Microsoft Exchange Server is Still Vulnerable to ProxyNotShell and/or OWASSRF Exploitation

Despite repeated warnings to patch on-premises and hybrid Microsoft Exchange servers during the past couple of years, the number of vulnerable servers remains concerning. We know that as long as devices remain unpatched, threat actors will keep exploiting them. This fact can be evidenced by a cursory review of CISA’s Known Exploited Vulnerabilities Catalog, which lists vulnerabilities known to currently be exploited dating back over 20 years.

Threat Awareness – Threat Actors Continue Infecting Victims Through Top Google Ads Search Results

Threat actors continue exploiting the Google Ad platform to infect users with malware or steal credentials or financial information. Recent reporting highlights how attackers are targeting password managers via malicious ads. Specifically, users of Bitwarden and 1Password reported that malicious ads on Google search were masquerading as the legitimate password manager domains and led users to credential stealing phishing sites. These incidents are just the latest in a series of incidents with password managers and Google’s Ad network over the past few months.

Ransomware Awareness – Insights on Ransomware Activity, Recent Trends, and the Importance of Threat Intelligence

Dark Reading posted an article providing insights from GuidePoint Security’s recently released GRIT 2022 Ransomware Report. GuidePoint offers multiple perspectives based on its ransomware negotiations. The report highlights four general categories that ransomware groups fall into and which are the most active threat. Additionally, the report offers additional considerations, most notably how improved backup strategies have been making a positive difference in being able to successfully recover after an attack.

Pages

Subscribe to Cybersecurity