CISA orders agencies impacted by Microsoft hack to mitigate risks

April 11, 2024 at 01:49PM The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive requiring U.S. federal agencies to address risks arising from the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group. The directive mandates agencies to investigate affected emails, reset compromised credentials, and secure privileged Microsoft … Read more

Ransomware as a Service and the Strange Economics of the Dark Web

March 27, 2024 at 10:10AM Ransomware evolution in the past months includes LockBit’s blog takedown, BlackCat’s exit, and smaller groups emergence. The ecosystem functions as a complex supply chain with RaaS dominating large groups. Affiliate competition and recent takedowns are shifting the landscape, potentially leading to ecosystem fragmentation. Corporate security recommendations include extensive monitoring, patching … Read more

Human vs. Non-Human Identity in SaaS

March 7, 2024 at 06:27AM In today’s SaaS environment, security efforts primarily focus on human users, using tools like MFA and RBAC. However, non-human access from apps and integrations poses a security challenge. Managing non-human accounts varies across apps and SaaS platforms, requiring specific security measures and continuous monitoring to detect anomalies and prevent unauthorized … Read more

The Rise of Social Engineering Fraud in Business Email Compromise

March 6, 2024 at 09:25AM Social engineering is rampant in 90% of phishing attacks, particularly in business email compromise (BEC) attacks. These attacks exploit human vulnerabilities, often targeting company executives and new employees. Threat groups like Octo Tempest and Diamond Sleet utilize social engineering to steal sensitive information. To defend against such attacks, organizations should … Read more

Russian hackers shift to cloud attacks, US and allies warn

February 26, 2024 at 12:35PM The Five Eyes intelligence alliance issued a warning about increased targeting of cloud services by APT29, a Russian hacking group. A joint advisory by international cybersecurity agencies highlights APT29’s tactics, including compromising access credentials and exploiting dormant accounts. Recommendations for defenders include enabling multi-factor authentication and strong passwords, among others, … Read more

Beyond Identity Introduces Device360 for Security Risk Visibility Across All Devices

February 23, 2024 at 03:59PM Beyond Identity has unveiled Device360, a new solution for continuous device security posture management that combines device security with authentication. The tool enables organizations to identify and prevent device security risks across managed and unmanaged devices, offering centralized visibility, real-time device query, and compliance enforcement at authentication. For more information, … Read more

Ex-Employee’s Admin Credentials Used in US Gov Agency Hack

February 16, 2024 at 10:03AM A threat actor gained access to a US government organization’s network using compromised credentials from a former employee’s administrative account, enabling reconnaissance and data theft. CISA advises organizations to review administrative accounts, implement MFA, and maintain robust security measures to prevent similar incidents. Key takeaways from the meeting notes are … Read more

U.S. State Government Network Breached via Former Employee’s Account

February 16, 2024 at 03:03AM The US CISA reported a state government network compromise due to a former employee’s admin account. The threat actor gained access via a virtual private network and obtained credentials from a separate breach. The incident highlighted the lack of multi-factor authentication and the need to secure privileged accounts. The attackers … Read more

How Nation-State Actors Target Your Business: New Research Exposes Major SaaS Vulnerabilities

February 15, 2024 at 06:35AM Wing Security’s analysis of 493 SaaS-using companies in Q4 2023 reveals the significance of SaaS-related risks following 2023’s cyber attacks. The report underlines the need for SaaS security measures, highlights common SaaS risks, and emphasizes the growing threat of supply chain attacks. It concludes with 8 ways to mitigate SaaS … Read more

4 Ways Hackers use Social Engineering to Bypass MFA

February 12, 2024 at 06:27AM The article emphasizes the importance of multi-factor authentication (MFA) in enhancing password security. It highlights four social engineering tactics hackers use to bypass MFA, including AITM attacks, MFA prompt bombing, service desk attacks, and SIM swapping. It stresses the significance of robust password security alongside MFA and suggests using tools … Read more