You are here

Cybersecurity

Ransomware Resilience – Preparing for Attacks Like They’re Natural Disasters

Ransomware attacks continue to be one of the most pernicious cyber threats organizations face today. A survey from the group CISOs Connect found that almost a quarter of all surveyed companies were impacted by ransomware attacks on more than one occasion. Consequently, some security researchers recommend conceptualizing ransomware defense on FEMA’s four phases of emergency management: mitigation, preparedness, response, and recovery.

Cyber Resilience – U.K. Cyber Center Publishes Guidance for Securing Cloud Infrastructure

The U.K.’s National Cyber Security Center (NCSC) published a guidance highlighting how organizations can better secure their data in cloud environments. The NCSC emphasize its important to use a cloud provider that is secure by design and by default, and one where the provider helps your organization meet its security responsibilities.

Joint Cybersecurity Advisory – #StopRansomware: Zeppelin Ransomware

Today, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI published a joint Cybersecurity Advisory (CSA) on Zeppelin ransomware, providing tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations defend against this threat. Zeppelin ransomware is a spinoff of the Delphi-based Vega malware family and operates as a Ransomware as a Service (RaaS). From 2019 through at least June 2022, attackers have used this malware to target a wide range of businesses and critical infrastructure entities.

What the Twilio Breach Teaches Us About Smishing and Access to Corporate Accounts and Data

As Twilio recently learned, threat actors are able to breach internal corporate systems by stealing employee credentials through SMS phishing (smishing) attacks. The work-from-home paradigm notwithstanding as a potential contributing factor to smishing-based compromises, the incident demonstrates that organizations are not immune from smishing attacks targeting employee devices.

Threat Awareness – Another Microsoft Phishing Campaign Capable of Bypassing Multifactor Authentication

A new large-scale phishing campaign is employing a custom proxy-based phishing kit to bypass multi-factor authentication (MFA) and a variety of URL obfuscation techniques to circumvent email security software to steal credentials for Microsoft email accounts, according to security researchers at Zscaler. Notably, the campaign has targeted energy companies in the U.S., the U.K., New Zealand, and Australia. Researchers believe the goal of the campaign is to compromise corporate email accounts to carry out BEC (business email compromise) attacks.

Pages

Subscribe to Cybersecurity