Hacking Operational Technology for Defense: Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure (FireEye)
Focusing collection, detection, and hunting efforts on assets or information that are likely to be compromised during these phases presents defenders with strategic opportunities to hunt for and detect targeted adversary activity before it poses a risk to control systems.
Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q1 2021 (Check Point)
In Q1, Microsoft was again the brand most frequently targeted by cybercriminals, as it was in Q4 2020. Thirty-nine percent of all brand phishing attempts were related to the technology giant (down slightly from 43% in Q4), as threat actors continued to try to capitalize on people working remotely.
Threat Actors Pair Tax-Themed Lures With COVID-19, Healthcare Themes (Proofpoint)
What makes 2021 unique are the continuing and unprecedented pandemic, healthcare, and financial crises that these threat actors are combining with typical tax lures in the ongoing campaigns Proofpoint observed.
Secure Your Apps and APIs. Everywhere. (F5)
F5 helps you to secure your applications and APIs by providing visibility and control wherever you need it from L4 to L7—and across clouds, data centers, and a growing set of edge locations.
Understanding the Lines Between EDR, NDR, TDR, XDR, and MDR (Arctic Wolf)
The world of cybersecurity doesn’t lack for acronyms. Whether it’s protocols and standards or tools and technology, the market is dominated by an endless array of capital letters.
Help to prevent theft of sensitive data – the easy way (Citrix)
With a VPN-less approach, IT admins can give users secure access to the on-premises web apps they need without granting access to all internal network resources.
Endpoint Detection and Response: All You Need to Know About EDR Security (Varonis)
Endpoint Detection and Response (EDR) is a fast-growing category of solutions that aim to provide deeper capabilities than traditional anti-virus and anti-malware solutions.
The Pernicious Effects of Ransomware (Crowdstrike)
Ransomware attacks can degrade people’s faith in the victims. When those victims include local government, schools, healthcare providers, employers or other institutions that people rely upon, the fabric of a society becomes weaker, leading to a growing psychological toll.
Innovation Done Right: Goodbye, Mechanical Disks (Pure Storage)
To meet today’s challenges, you need solutions that empower you to focus on innovation and operational excellence to drive efficiency. That frees up resources to invest in a landscape with new demands.
March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign (Check Point)
Check Point Research’s (CPR) latest Global Threat Index for March 2021 has revealed that the banking trojan IcedID has entered the Index for the first time, taking second place, while the established Dridex trojan was the most prevalent malware during March, up from seventh position in February.
Multi-factor authentication: Use it for all the people that access your network, all the time
The vast majority of cyberattacks involve a password being hacked - providing your employees with multi-factor authentication could go a long way towards stopping cyber criminals breaking into your network.