Upleveling the State of SMB Cybersecurity

June 6, 2024 at 07:42AM Cybersecurity threats are increasingly targeting small and medium-sized businesses (SMBs), with 94% experiencing attacks in 2024, up from 64% in 2019. SMBs face challenges such as resource constraints, lack of awareness, and sophisticated threats. Managed Service Providers (MSPs) are rising as essential allies, offering expertise, services, and support to strengthen … Read more

SANS’s 2024 Threat-Hunting Survey Review

June 5, 2024 at 12:48PM The 2024 SANS Threat-Hunting Survey reveals a growing maturity in threat-hunting methodologies, reflecting an increased adoption of formal processes in cybersecurity strategies. The survey also highlights evolving practices in sourcing intelligence, outsourcing threat hunting, and challenges related to skill shortages and tool limitations. Organizations are striving to enhance threat hunting … Read more

A SANS’s 2024 Threat-Hunting Survey Review

June 4, 2024 at 05:16PM The 2024 SANS Threat Hunting Survey reveals a rise in organizations adopting formal threat-hunting processes, reflecting a standardized approach in cybersecurity strategies. The survey’s participants span various industries and organization sizes, showcasing the multifaceted nature of threat hunting. Notably, prevalent cyber threats include BEC and ransomware, prompting evolving threat-hunting practices … Read more

Russian Power Companies, IT Firms, and Govt Agencies Hit by Decoy Dog Trojan

June 4, 2024 at 12:06PM Russian organizations have been targeted in cyber attacks delivering a Windows version of the Decoy Dog malware by the HellHounds group. The advanced persistent threat (APT) group compromises organizations, remaining undetected for years. The malware includes a custom variant of the open-source Pupy RAT and is designed to maintain covert … Read more

Beyond Threat Detection – A Race to Digital Security

May 31, 2024 at 08:09AM The digital landscape presents both benefits and threats as sharing digital content expands, particularly through email, documents, and chat. Cybersecurity is a relentless battle, with threat actors continuously evolving tactics to outpace defenses. Everfox’s innovative prevention-based approach, especially its transformation-based Content Disarm and Reconstruction, is non-reliant on detection and effectively … Read more

Microsoft: ‘Moonstone Sleet’ APT Melds Espionage, Financial Goals

May 29, 2024 at 04:57PM Microsoft researchers have identified Moonstone Sleet, a North Korean threat group, carrying out espionage and financial cyberattacks using a variety of techniques against aerospace, education, and software organizations. Moonstone Sleet’s multifaceted strategies blend cybercriminal and nation-state actor methodologies, including creating fake companies and distributing custom ransomware and a fake video … Read more

Pakistani ‘Transparent Tribe’ APT Aims for Cross-Platform Impact

May 28, 2024 at 11:33PM A cyber-espionage group, Transparent Tribe, known for targeting government and defense sectors in India, has expanded its tactics to include targeting Linux systems using legitimate software techniques, including Google Drive and Telegram. Despite a history of targeting India, the group has also attacked the US, Europe, and Australia. They utilize … Read more

When ‘No’ & ‘Good Enough’ Challenge Cybersecurity

May 24, 2024 at 10:06AM In the cybersecurity realm, the challenge for CISOs is advocating for comprehensive defense strategies amid budget constraints and organizational resistance. The reliance on “good enough” is risky, as advanced capabilities are essential to thwart evolving threats. Persistent advocacy and strategic risk management are crucial, and alignment with cybersecurity priorities may … Read more

Microsoft spots gift card thieves using cyber-espionage tactics

May 23, 2024 at 03:33PM Microsoft has released a “Cyber Signals” report revealing information about the hacking group Storm-0539 and an increase in gift card theft leading up to the Memorial Day holiday in the United States. The report highlights the group’s advanced techniques and a rise in their activity before major holidays. Microsoft also … Read more

SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure

May 21, 2024 at 09:12AM Persistent threat actors behind the SolarMarker malware have established a complex, multi-tiered infrastructure, making it challenging for law enforcement to take down. The malware targets various sectors and has evolved to enhance stealth and control over victim machines. Recorded Future’s investigation uncovered the architecture of the command-and-control (C2) servers. After … Read more