Blogs

Dark Pink: Emerging Threat Actor Overview
What is Dark Pink?
An emerging campaign of advanced persistent threat (APT) attacks is spreading across the Asia-Pacific (APAC) region, and it has been attributed to a new group called Dark Pink (also known as Saaiwc Group by some Chinese researchers). While evidence suggests that the group has likely been active since mid-2021, their first known successful attack wasn't observed until June 2022.

TrickGate: The Malware Master of Disguise
By: Critical Start Cyber Threat Intelligence (CTI) Team

IOCs vs TTPs
Definitions:
An IOC (Indicator of Compromise) and a TTP (Tactics, Techniques, and Procedures) are two different types of cybersecurity indicators that organizations use to detect and respond to cyber threats.

Applying the Biden-Harris Administration’s National Cybersecurity Strategy to your Organization in Five Steps
As cyber threats continue to evolve and grow, it is increasingly clear that a coordinated and comprehensive approach to cybersecurity is necessary. Governments around the world have recognized the need for national cybersecurity strategies to protect their citizens, businesses, and critical infrastructure.

IOCs vs TTPs
Definitions:
An IOC (Indicator of Compromise) and a TTP (Tactics, Techniques, and Procedures) are two different types of cybersecurity indicators that organizations use to detect and respond to cyber threats.

A Brief Discussion on Cyber Threat Intelligence Framework
There are many different cyber threat intelligence frameworks available, and the best one for you will depend on your specific needs and resources. Some popular frameworks include:

Five Reasons Why Your Organization Needs a Managed SIEM Solution
Security Information and Event Management (SIEM): A Quick History
Back in 2005, the first generation of Security Information and Event Management (SIEM) platforms was a pretty big deal. These platforms combined security event management with security information for the first time, bringing the data security industry into a new era. (cybersecurity-magazine.com)

Warning: Cybercriminals Use Phishing Scams Following Syria-Turkey Tragedy
Following the recent earthquakes in Syria-Turkey, security experts have warned of phishing scams launched by cybercriminals to deceive people into donating to fake causes. These scams take advantage of people's generosity and willingness to help those affected by the disaster. They may come in the form of emails or social media messages that appear to be from legitimate charities or relief organizations, but in reality, are fake.

Merging Disparate Security Controls: Finding Your Perfect MDR Match
There is a lot of pressure out there in a busy cybersecurity world, and you’ve been dealing with lonely, disparate security controls. There’s pressure to reduce time to detect and response. Challenges around configuration, deployment, and maintenance of tools. And so many apps and online profiles to sort through to see what the best cybersecurity solutions have to offer. Let’s face it. When it comes to searching for your perfect Managed Detection and Response (MDR) match – you're (alert) fatigued.

Log4j: The Aftermath and Lessons Learned
A Look Back

Uncover More Attacks Faster with the New Vision One Platform: A Trend Micro Partnership
One of our core tenants since launching MDR services at Critical Start has always been that we don’t build “threat detection” products. There are a massive number of security vendors in the marketplace, and we’ve always believed it would be foolish to think that we could out-innovate all of them to provide a more effective threat detection tool.