Blogs

Understanding Business Email Compromise Attacks: A Growing Threat
In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Surfing the Risks: Navigating Public Wi-Fi's Hidden Threats
Threat Background
Public Wi-Fi networks, while offering convenience, expose users to various security vulnerabilities due to their open nature and absence of encryption. Although Wi-Fi scanning malware has historically been less prevalent compared to other malicious software categories like ransomware, trojans, or phishing attacks, a novel variant of Wi-Fi scanning malware has recently emerged in the wild.

Event Fields

Unveiling the Shadows: Exploring Credential Harvesting Methods
Credential Harvesting Background
A recent study reveals that so far in 2023, 41% of breaches have involved the use of stolen credentials. Cyber actors perceive human error as the number one threat to cybersecurity, and targeting individuals of an organization for credential harvesting is far easier than attempting to hack a technical element of an IT system.

Securing the Future: Insights from a CISO on the Cyber Risk Landscape
As a security leader, there are plenty of challenges that stand between your team (or perhaps, just you) and protecting your entire organization. While many CISOs, CIOs, and other cyber leaders deal with a lack of data, resources, and staffing issues, it’s important to remember that you’re not alone. As a CISO in the cybersecurity industry, our organization’s job as a pioneer in Managed Detection and Response (MDR) is to support you and learn about your needs.

A New Cluster of Threat Activity: Cybercriminals, Friends, and Allies
Background of Cyber Cluster Activity
Since the beginning of 2023, cyber threat research has revealed that several known ransomware groups are sharing Tactics Techniques and Procedures (TTPs) at a granular level. It is likely this trend is due to new ransomware-as-a-service (RaaS) groups emerging and existing groups re-branding or shutting down operations. Due to the RaaS operating model, it is not uncommon for there to be crossover in groups and the TTPs they use.

Cybercriminals Attack Vectors within the Education Sector
Introduction
As a follow-up to, “The Escalating Threat of Ransomware Attacks in the Education Sector”, this article will dive into the different attack vectors that cybercriminals have used in the educa

Unlocking the Power of Microsoft E5 with MXDR Services
In today's ever-evolving threat landscape, organizations face immense challenges in safeguarding their valuable data and infrastructure. Microsoft E5 licensing, with its advanced security capabilities, presents a compelling solution to combat cyber threats. However, many organizations with Microsoft E3 have concerns about moving to E5 or are actively transitioning to E5 and searching for best practices. It’s also important to note that simply owning Microsoft E5, without properly leveraging your investment, is not enough to ensure optimal security outcomes.

AI’s Dual-Edged Sword: Finding the Balance Between Security and Innovation
As dawn breaks over the world of artificial intelligence (AI), concerns and excitement intermingle. From coding to content creation, people across all industries are relying on a variety of AI tools to carry out their day-to-day job functions.

Navigating the Cyber Risk Conundrum: The Power of Managed Cyber Risk Reduction
We know what you’re facing. You are in a cyber risk conundrum, and it sucks.

Risk vs. Reality: Understanding Cyber Risk Confidence among Cyber Leaders
With ever-evolving cybersecurity threats and obstacles, many cybersecurity leaders find themselves in a constant struggle to align cyber protection measures with their risk appetite. As a CISO responsible for safeguarding our organization, I understand the immense challenges many face mitigating cyber threats while juggling limited resources and financial constraints.

The Escalating Threat of Ransomware Attacks in the Education Sector
Ransomware Attacks on Educational Institutions are Increasing
Ransomware attacks on the education sector have emerged as a critical and persistent threat, targeting schools, colleges, and universities worldwide. In a recent report, researchers stated there were 190 known ransomware attacks against educational institutions worldwide between June 2022 and May 2023, with a staggering 84% surge in known attacks during the first six months of 2023.