Loading...
Threat actors continue to use opportunistic attacks to compromise networks and deploy SamSam ransomware to collect money from various types of organizations.
Category:CTU Research
Information Security
Leadership Insights

Threat actors continue to use opportunistic attacks to compromise networks and deploy SamSam ransomware to collect money from various types of organizations.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Key insights from top industry analysts to help demystify the cybersecurity landscape and reinforce critical areas of focus for organizations worldwide. 
Category:Information Security
Risk Management
Leadership Insights

Key insights from top industry analysts to help demystify the cybersecurity landscape and reinforce critical areas of focus for organizations worldwide.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
By exploiting a known vulnerability on Internet-facing Oracle WebLogic servers, threat actors deployed cryptocurrency miners to Linux and Windows systems.
Category:Incident Response and Management
CTU Research
Risk Management

By exploiting a known vulnerability on Internet-facing Oracle WebLogic servers, threat actors deployed cryptocurrency miners to Linux and Windows systems.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
By all means patch, but take a risk-based approach
Category:Intelligence
Learn why you should take a risk-based approach when you patch for Spectre and Meltdown.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
SecureWorks Blog - Threats and Defenses by Counter Threat Unit™ Research Team - 6M ago
Dalton and Flowsynth help create and test packet captures
Category:Information Security
Risk Management

The CTU research team publicly released packet capture tools for intrusion detection systems.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Single-factor login services are common targets for BEC
Category:Incident Response and Management
Intelligence

Adding multifactor authentication for services such as Exchange Online (Office 365) can prevent threat actors from stealing credentials.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Threat actors leveraged compromised credentials to harvest payment data
Category:Intelligence
Incident Response and Management

Improper configurations and inadequate security controls can allow attackers to access eCommerce platforms and add malicious scripts.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Prevent exposure of confidential data and satisfy regulations
Category:Information Security

Tokens can protect a variety of sensitive data, including PII and PHI. Tokenization and encryption can also save organizations time and money.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Organizations can use lessons learned to improve their security posture
Category:Incident Response and Management

See how organizations can improve their security posture by evaluating their response to the NotPetya malware.
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Organizations can use lessons learned to improve incident response
Category:Incident Response and Management

See how organizations can improve their security posture by evaluating their response to the NotPetya malware.
Read Full Article
Visit website

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview