Blogs

Slack Security Challenges: Protecting Your Organization from Threats
In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part four of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

2023's Digital Intruders: Unmasking the Year's Top Malware So Far
Background
The enduring and evolving threat of malware remains a predominant concern in the cybersecurity realm, imperiling individuals, organizations, and even entire nations. Malware infiltrates systems through diverse entry points, from malicious email attachments to compromised websites and sophisticated social engineering schemes that deceive unwitting users into executing malevolent code.

Zoom Securely: Navigating the Virtual Boardroom in the Digital Era
In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part three of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Understanding the Resurgence of Kerberoasting Attacks in Today's Threat Landscape
Recently, there has been a resurgence of Kerberoasting attacks, revealing a concerning trend in the evolving tactics of cybercriminal groups. These attacks, which target the Kerberos authentication protocols used in Windows environments, have seen a staggering 583% increase over the past year. Kerberoasting has been a recognized cyberattack method since approximately 2014. It targets the Kerberos authentication system, integral to Windows-based infrastructures.

Exploiting the Abandoned: Exposing Phishing Tactics Through Neglected Websites
Background of Abandoned Website Phishing
The Critical Start Cyber Threat Intelligence Team is aware of cybercriminals employing a tactic known as "abandoned website phishing" to carry out their malicious activities. In this approach, attackers take advantage of websites that have been neglected or abandoned by their original owners.

The Biggest Cybersecurity Challenges for Credit Unions
Credit unions play a vital role in the financial sector, offering essential financial services to their members. However, the digital landscape also puts credit unions at risk of cyberattacks and other vulnerabilities.
There is a rise in cyberattacks against credit unions, according to the National Credit Union Administration (NCUA).

Teams Under Siege: Uncovering Microsoft's Cyber Quirks
In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part two of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Celebrating Women in Cybersecurity
Today is a special day in our industry, as we celebrate International Women in Cybersecurity Day (IWCD). IWCD's purpose is to recognize women's immeasurable accomplishments and address the challenges women face in the industry. It’s a day we can look back at women's growth and make plans for a brighter future that’s more inclusive of women in cybersecurity.

Understanding Business Email Compromise Attacks: A Growing Threat
In the modern digital landscape, enterprises utilize communication platforms to facilitate smooth interactions; however, these conveniences also open up numerous avenues that can be exploited by malicious actors. This blog, part of the Business Communication Risks series, highlights how seemingly benign platforms can become pathways for attackers targeting individuals and infiltrating organizations.

Surfing the Risks: Navigating Public Wi-Fi's Hidden Threats
Threat Background
Public Wi-Fi networks, while offering convenience, expose users to various security vulnerabilities due to their open nature and absence of encryption. Although Wi-Fi scanning malware has historically been less prevalent compared to other malicious software categories like ransomware, trojans, or phishing attacks, a novel variant of Wi-Fi scanning malware has recently emerged in the wild.

Event Fields

Unveiling the Shadows: Exploring Credential Harvesting Methods
Credential Harvesting Background
A recent study reveals that so far in 2023, 41% of breaches have involved the use of stolen credentials. Cyber actors perceive human error as the number one threat to cybersecurity, and targeting individuals of an organization for credential harvesting is far easier than attempting to hack a technical element of an IT system.