Blogs

Blog Image

Understanding Business Email Compromise Attacks: A Growing Threat

In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Blog Image

Surfing the Risks: Navigating Public Wi-Fi's Hidden Threats

Threat Background

Public Wi-Fi networks, while offering convenience, expose users to various security vulnerabilities due to their open nature and absence of encryption. Although Wi-Fi scanning malware has historically been less prevalent compared to other malicious software categories like ransomware, trojans, or phishing attacks, a novel variant of Wi-Fi scanning malware has recently emerged in the wild.

Blog Image

Event Fields

event-fields
Blog Image

Unveiling the Shadows: Exploring Credential Harvesting Methods

Credential Harvesting Background 

A recent study reveals that so far in 2023, 41% of breaches have involved the use of stolen credentials. Cyber actors perceive human error as the number one threat to cybersecurity, and targeting individuals of an organization for credential harvesting is far easier than attempting to hack a technical element of an IT system.

Blog Image

Securing the Future: Insights from a CISO on the Cyber Risk Landscape

As a security leader, there are plenty of challenges that stand between your team (or perhaps, just you) and protecting your entire organization. While many CISOs, CIOs, and other cyber leaders deal with a lack of data, resources, and staffing issues, it’s important to remember that you’re not alone. As a CISO in the cybersecurity industry, our organization’s job as a pioneer in Managed Detection and Response (MDR) is to support you and learn about your needs.  

Blog Image

A New Cluster of Threat Activity: Cybercriminals, Friends, and Allies  

Background of Cyber Cluster Activity 

Since the beginning of 2023, cyber threat research has revealed that several known ransomware groups are sharing Tactics Techniques and Procedures (TTPs) at a granular level. It is likely this trend is due to new ransomware-as-a-service (RaaS) groups emerging and existing groups re-branding or shutting down operations. Due to the RaaS operating model, it is not uncommon for there to be crossover in groups and the TTPs they use.

Blog Image

Cybercriminals Attack Vectors within the Education Sector 

Introduction  

As a follow-up to, “The Escalating Threat of Ransomware Attacks in the Education Sector”, this article will dive into the different attack vectors that cybercriminals have used in the educa

Blog Image

Unlocking the Power of Microsoft E5 with MXDR Services 

In today's ever-evolving threat landscape, organizations face immense challenges in safeguarding their valuable data and infrastructure. Microsoft E5 licensing, with its advanced security capabilities, presents a compelling solution to combat cyber threats. However, many organizations with Microsoft E3 have concerns about moving to E5 or are actively transitioning to E5 and searching for best practices. It’s also important to note that simply owning Microsoft E5, without properly leveraging your investment, is not enough to ensure optimal security outcomes.

Blog Image

AI’s Dual-Edged Sword: Finding the Balance Between Security and Innovation 

As dawn breaks over the world of artificial intelligence (AI), concerns and excitement intermingle. From coding to content creation, people across all industries are relying on a variety of AI tools to carry out their day-to-day job functions.

Blog Image

Navigating the Cyber Risk Conundrum: The Power of Managed Cyber Risk Reduction

We know what you’re facing. You are in a cyber risk conundrum, and it sucks.

Blog Image

Risk vs. Reality: Understanding Cyber Risk Confidence among Cyber Leaders  

With ever-evolving cybersecurity threats and obstacles, many cybersecurity leaders find themselves in a constant struggle to align cyber protection measures with their risk appetite. As a CISO responsible for safeguarding our organization, I understand the immense challenges many face mitigating cyber threats while juggling limited resources and financial constraints. 
 

Blog Image

The Escalating Threat of Ransomware Attacks in the Education Sector 

Ransomware Attacks on Educational Institutions are Increasing 

Ransomware attacks on the education sector have emerged as a critical and persistent threat, targeting schools, colleges, and universities worldwide. In a recent report, researchers stated there were 190 known ransomware attacks against educational institutions worldwide between June 2022 and May 2023, with a staggering 84% surge in known attacks during the first six months of 2023.