Blogs

Blog Image

Dark Pink: Emerging Threat Actor Overview 

What is Dark Pink? 

An emerging campaign of advanced persistent threat (APT) attacks is spreading across the Asia-Pacific (APAC) region, and it has been attributed to a new group called Dark Pink (also known as Saaiwc Group by some Chinese researchers). While evidence suggests that the group has likely been active since mid-2021, their first known successful attack wasn't observed until June 2022.

Blog Image

TrickGate: The Malware Master of Disguise 

By: Critical Start Cyber Threat Intelligence (CTI) Team 

Blog Image

IOCs vs TTPs

Definitions:

An IOC (Indicator of Compromise) and a TTP (Tactics, Techniques, and Procedures) are two different types of cybersecurity indicators that organizations use to detect and respond to cyber threats.

Blog Image

Applying the Biden-Harris Administration’s National Cybersecurity Strategy to your Organization in Five Steps 

As cyber threats continue to evolve and grow, it is increasingly clear that a coordinated and comprehensive approach to cybersecurity is necessary. Governments around the world have recognized the need for national cybersecurity strategies to protect their citizens, businesses, and critical infrastructure.

Blog Image

IOCs vs TTPs

Definitions:

An IOC (Indicator of Compromise) and a TTP (Tactics, Techniques, and Procedures) are two different types of cybersecurity indicators that organizations use to detect and respond to cyber threats.

Blog Image

A Brief Discussion on Cyber Threat Intelligence Framework

There are many different cyber threat intelligence frameworks available, and the best one for you will depend on your specific needs and resources. Some popular frameworks include:

Blog Image

Five Reasons Why Your Organization Needs a Managed SIEM Solution 

Security Information and Event Management (SIEM): A Quick History 

Back in 2005, the first generation of Security Information and Event Management (SIEM) platforms was a pretty big deal. These platforms combined security event management with security information for the first time, bringing the data security industry into a new era. (cybersecurity-magazine.com

Blog Image

Warning: Cybercriminals Use Phishing Scams Following Syria-Turkey Tragedy

Following the recent earthquakes in Syria-Turkey, security experts have warned of phishing scams launched by cybercriminals to deceive people into donating to fake causes. These scams take advantage of people's generosity and willingness to help those affected by the disaster. They may come in the form of emails or social media messages that appear to be from legitimate charities or relief organizations, but in reality, are fake.

Blog Image

Merging Disparate Security Controls: Finding Your Perfect MDR Match

There is a lot of pressure out there in a busy cybersecurity world, and you’ve been dealing with lonely, disparate security controls. There’s pressure to reduce time to detect and response. Challenges around configuration, deployment, and maintenance of tools. And so many apps and online profiles to sort through to see what the best cybersecurity solutions have to offer. Let’s face it. When it comes to searching for your perfect Managed Detection and Response (MDR) match – you're (alert) fatigued.

Blog Image

Uncover More Attacks Faster with the New Vision One Platform: A Trend Micro Partnership

One of our core tenants since launching MDR services at Critical Start has always been that we don’t build “threat detection” products. There are a massive number of security vendors in the marketplace, and we’ve always believed it would be foolish to think that we could out-innovate all of them to provide a more effective threat detection tool.