LOLBins: executing payloads through DNS records
Redscan
by Mikesh Nagar
1y ago
A new Living Off the Land Binaries (LOLBins) tactic for executing payloads through Powershell was recently released. In this blog post, we outline the research our Threat Intelligence team has undertaken into this new attack vector. A new LOLBins tactic for executing payloads through PowerShell was released by Alh4zr3d, a security researcher, on Twitter in September 2022. In the tweet, the security researcher recommended that organisations stay away from IEX and Invoke-WebRequest when using PowerShell commands and, as a substitute, host a text record with their payload on a domain.   What ..read more
Visit website
Kroll CFO report reveals high cost of business overconfidence around cyber risk
Redscan
by Mark Nicholls
1y ago
A new survey by Kroll has revealed the extent of over-confidence among Chief Financial Officers (CFOs) and the organisational and financial impact of this approach. Our new CFO cybersecurity survey, which surveyed 180 CFOs, CEOs and other financial executives worldwide, has highlighted the fact that Chief Financial Officers are very confident in their companies’ abilities to ward off cyber security incidents, despite being underinformed on the cyber risk their businesses face. Almost 87% of the surveyed executives expressed this confidence, yet 61% of them had suffered at least three significa ..read more
Visit website
Vote for Kroll at the Computing Security Awards 2022!
Redscan
by The Redscan Team
1y ago
We are delighted to share that we have been named as finalists at the Computing Security Awards 2022. Kroll has been listed in four categories for this year’s Computing Security Awards – and we would be very grateful for your vote! Vote for Kroll here   The Computing Security Awards showcase the cyber security providers and solutions that have had an outstanding impact over the past year. Kroll is a finalist in the following categories: Penetration Testing Solution of the Year – Kroll Penetration Testing Remote Monitoring Security Solution of the Year – Kroll Responder Breach and Attack ..read more
Visit website
Join Kroll at Incident Response Forum Europe 2022
Redscan
by The Redscan Team
1y ago
Kroll is proud to be the lead sponsor of the Incident Response Forum Europe 2022, a live virtual event. The Incident Response Forum Europe 2022 is the only conference of its kind to focus solely on incident response, bringing together senior cyber security professionals from government, law firms and corporations. The forum draws together leading lawyers, consultants and other professionals around the world, including senior European and other government cyber security officials, to discuss key issues. This year, sessions are geared towards the legal and compliance professionals who play a cr ..read more
Visit website
Top 5 penetration testing methodologies
Redscan
by Mark Nicholls
1y ago
Hidden vulnerabilities in an organisation’s computer networks, systems and applications can lead to significant security risks, but how do pen testers go about uncovering them? Penetration testing plays a key role in identifying and addressing vulnerabilities by simulating the behaviour of a potential attacker. A range of penetration testing methodologies have been developed to enable security professionals to achieve this safely and effectively. In this blog post, we discuss the leading pen testing methodologies, what they involve and the aspects they cover.   Why are pen testing methodo ..read more
Visit website
New Kroll threat landscape report highlights significant rise in attacks on healthcare
Redscan
by The Redscan Team
1y ago
Kroll’s Q2 2022 Threat Landscape report has revealed a 90% increase in the number of healthcare organisations targeted, in comparison with Q1 2022. This has been fuelled by ransomware, with attacks increasing to a level which made it the most common threat for the quarter.   Created by threat intelligence specialists from Kroll and Redscan, the new report, Q2 2022 Threat Landscape: Ransomware Returns, Healthcare Hit, explores key insights and trends, and is based on our experience derived from handling over 3,200 cyber incidents handled worldwide a year. The report outlines some notable s ..read more
Visit website
Building a BYOD checklist for your business
Redscan
by The Redscan Team
1y ago
Bring-your-own-device (BYOD), the practice of allowing employees to use personal devices to access company networks, has grown significantly in recent years, mainly due to the impact of the COVID-19 pandemic. While BYOD provides flexibility to employees and organisations, it also presents a number of risks. In this blog post, we discuss the issues created by the use of BYOD and outline the elements of an effective checklist.   The rise of BYOD From employees using their own mobile phones to make company calls to business being conducted on personal laptops, BYOD has never been bigger. The ..read more
Visit website
Q2 2022 Threat Landscape Briefing: Ransomware Returns, Healthcare Hit
Redscan
by The Redscan Team
1y ago
This webinar, presented by cyber threat intelligence leaders from Kroll, will outline key insights and trends from the Q2 2022. In Q2 2022, Kroll observed a 90% increase in attacks against the health care sector in comparison with Q1 2022, making it the most affected sector during this period. While this may signal the official end of the pandemic-era “truce” that many cybercriminals promised at the onset of COVID-19, threat actors are continuing to leverage other hallmarks of the pandemic, such as remote work access, to gain a foothold into victim networks. In Q2 2022, Kroll also observed an ..read more
Visit website
How to defend against third party cyber-attacks
Redscan
by The Redscan Team
1y ago
Whether it is vendors, suppliers or contractors, third parties are critical to the success of most organisations. However, they can also present significant cyber security risks. In this blog post, we discuss the different types of challenges that third party relationships present and outline specific ways to defend against them. Third party risk is created when companies in an organisation’s supply chain have access to its data, systems or privileged information. This can lead to issues such as data breaches, IP theft or other security incidents. Organisations can be held accountable for secu ..read more
Visit website
How your organisation can benefit from continuous penetration testing
Redscan
by The Redscan Team
1y ago
While many organisations recognise the importance of penetration testing, security managers are becoming increasingly aware of the value of much more regular assessments. In this blog post, we outline what continuous penetration testing is, how it works and how it can help improve your cyber security.   What is continuous penetration testing? A penetration test is an ethical cyber security assessment that enables organisations to enhance their security. Pen tests cover many different types of assessments. Technical environments are continually evolving, with new vulnerabilities constantly ..read more
Visit website

Follow Redscan on FeedSpot

Continue with Google
Continue with Apple
OR