Blogs

Blog Image

Slack Security Challenges: Protecting Your Organization from Threats

In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part four of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Blog Image

2023's Digital Intruders: Unmasking the Year's Top Malware So Far

Background

The enduring and evolving threat of malware remains a predominant concern in the cybersecurity realm, imperiling individuals, organizations, and even entire nations. Malware infiltrates systems through diverse entry points, from malicious email attachments to compromised websites and sophisticated social engineering schemes that deceive unwitting users into executing malevolent code.

Blog Image

Zoom Securely: Navigating the Virtual Boardroom in the Digital Era

In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part three of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Blog Image

Understanding the Resurgence of Kerberoasting Attacks in Today's Threat Landscape

Recently, there has been a resurgence of Kerberoasting attacks, revealing a concerning trend in the evolving tactics of cybercriminal groups. These attacks, which target the Kerberos authentication protocols used in Windows environments, have seen a staggering 583% increase over the past year. Kerberoasting has been a recognized cyberattack method since approximately 2014. It targets the Kerberos authentication system, integral to Windows-based infrastructures.

Blog Image

Exploiting the Abandoned: Exposing Phishing Tactics Through Neglected Websites

Background of Abandoned Website Phishing 

The Critical Start Cyber Threat Intelligence Team is aware of cybercriminals employing a tactic known as "abandoned website phishing" to carry out their malicious activities. In this approach, attackers take advantage of websites that have been neglected or abandoned by their original owners.

Blog Image

The Biggest Cybersecurity Challenges for Credit Unions

Credit unions play a vital role in the financial sector, offering essential financial services to their members. However, the digital landscape also puts credit unions at risk of cyberattacks and other vulnerabilities.

There is a rise in cyberattacks against credit unions, according to the National Credit Union Administration (NCUA).

Blog Image

Teams Under Siege: Uncovering Microsoft's Cyber Quirks 

In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part two of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Blog Image

Celebrating Women in Cybersecurity  

Today is a special day in our industry, as we celebrate International Women in Cybersecurity Day (IWCD). IWCD's purpose is to recognize women's immeasurable accomplishments and address the challenges women face in the industry. It’s a day we can look back at women's growth and make plans for a brighter future that’s more inclusive of women in cybersecurity.  

Blog Image

Understanding Business Email Compromise Attacks: A Growing Threat

In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Blog Image

Surfing the Risks: Navigating Public Wi-Fi's Hidden Threats

Threat Background

Public Wi-Fi networks, while offering convenience, expose users to various security vulnerabilities due to their open nature and absence of encryption. Although Wi-Fi scanning malware has historically been less prevalent compared to other malicious software categories like ransomware, trojans, or phishing attacks, a novel variant of Wi-Fi scanning malware has recently emerged in the wild.

Blog Image

Event Fields

event-fields
Blog Image

Unveiling the Shadows: Exploring Credential Harvesting Methods

Credential Harvesting Background 

A recent study reveals that so far in 2023, 41% of breaches have involved the use of stolen credentials. Cyber actors perceive human error as the number one threat to cybersecurity, and targeting individuals of an organization for credential harvesting is far easier than attempting to hack a technical element of an IT system.