Monday 1/23
3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler (CrowdStrike)
With the erosion of the corporate network perimeter and increased employee access to sensitive information from remote locations, corporate endpoints are left out in the wild and are often difficult to monitor for suspicious activity.
http://bit.ly/3WsqIBz
Fewer ransomware victims are paying up. But there's a catch
Cyber criminals are finding it harder to make money from ransomware attacks. But that doesn't mean ransomware is less dangerous.
http://bit.ly/3D7K20b
Tuesday 1/24
Ransomware Roundup – Playing Whack-a-Mole with New CrySIS/Dharma Variants (Fortinet)
The CrySIS/Dharma ransomware family has been around for several years – dating to at least 2016. It nominally operates using a Ransomware-as-a-Service (RaaS) model. However, it should also be noted that at least one version of the ransomware had its source code leaked, allowing anyone to purchase and repurpose it for their own ends.
http://bit.ly/3JdMar4
Wednesday 1/25
Brand Phishing report – Q4 2022 (Check Point)
Following a significant phishing campaign in the previous quarter, Yahoo became the top brand impersonated in phishing attacks in Q4 2022, climbing 23 spots in the ranking from the previous quarter.
http://bit.ly/40eJqzZ
Are you ready to shrink the economy of the big business of cybercrime? Our Partner, @ Arctic Wolf, is taking a deep dive into the business of cybercrime. Learn the attack methods, threat actors, and how to cut off the cash HERE.
https://arcticwolf.com/business-of-cybercrime/
Thursday 1/26
Implementing Cloud-Native Security (Palo Alto Networks)
Vulnerabilities to the systems and environments in the cloud expose us to grave threats, given application capabilities, as well as the amount and sensitivity of data.
http://bit.ly/3H7G6Od
Stealer malware: This simple software helps amateurs hack big targets (Cybersixgill)
Fraudsters exploit usernames, passwords, and other personal data to hack businesses and governments. Here’s how Cybersixgill helps you protect your organization.
http://bit.ly/3j3rsj8
Friday 1/27
Hybrid Azure AD Join Demystified
If you are confused about Azure AD hybrid join, what it is, when to use it, and how to set it up - keep reading. Azure AD hybrid join is for Windows devices and is one of three methods to associate devices to Azure AD.
http://bit.ly/3RiLVNy
Why No User Should Have Local Admin Rights (CyberArk)
Removing local admin rights as a security measure is not going to be a revelation to you as a security pro, or to anybody even remotely associated with IT, for that matter. But if you’re anything like me, seeing so many risky possibilities in one place is helpful for making the step from understanding to action.
http://bit.ly/3Y3m9il
DOJ takes down ransomware group with a '21st century cyber stakeout'
Authorities have disrupted the Hive ransomware group by infiltrating its computer networks and capturing its decryption keys, saving victims over $100 million in ransom payments.
http://bit.ly/3WQuRQc