The OODA Loop: The Military Model That Speeds Up Cybersecurity Response

March 25, 2024 at 03:00PM In the fast-paced realm of cybersecurity, time is of the essence. Cybercriminals exploit vulnerabilities within 24 hours of access. To combat this, the OODA Loop Military Model, built on Observe, Orient, Decide, and Act, aids defenders. SASE, a cloud-native architecture, harnesses this model by consolidating security controls, enabling real-time visibility, … Read more

Microsoft Copilot for Security Official Launch Date Announced

March 14, 2024 at 09:15AM Microsoft’s Copilot for Security, using generative AI, will be available globally starting April 1, 2024, following an invite-only program. It enhances security professionals’ capabilities by assisting in incident response, threat hunting, posture management, and intelligence collection using natural language interaction. The solution is based on OpenAI architecture with access to … Read more

GAO: CISA’s OT Teams Inadequately Staffed

March 12, 2024 at 06:27PM The GAO study found that some teams at CISA were inadequately staffed in providing OT products and services. While most entities had positive experiences, there were complaints about insufficient staff, such as four federal employees and five contractors for threat hunting and incident response. Staff shortages resulted in unmet requests, … Read more

10 Essential Processes for Reducing the Top 11 Cloud Risks

March 6, 2024 at 10:02AM The cloud security landscape continues to evolve, with the Cloud Security Alliance (CSA) highlighting 11 key threats and recommended defenses. Issues like misconfigurations and inadequate change control continue to challenge organizations. Effective strategies include building a robust identity program and investing in threat hunting, emphasizing the need for proactive measures … Read more

Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO

March 4, 2024 at 03:58AM The Trend Micro threat hunting team recently discovered an RA World ransomware attack using multistage components to ensure maximum impact. The group has successfully breached organizations globally, with a focus on healthcare and financial sectors. The attack involves complex stages, including initial access, privilege escalation, lateral movement, persistence, defense evasion, … Read more

From Alert to Action: How to Speed Up Your SOC Investigations

February 27, 2024 at 06:15AM Security Operations Centers (SOC) professionals rely on processing alerts swiftly. Threat intelligence platforms, such as ANY.RUN’s Threat Intelligence Lookup, facilitate SOC investigations by providing access to threat data and enhancing threat analysis. These platforms offer deeper visibility into threats, faster alert investigations, proactive threat hunting, and support informed decision-making. From … Read more

Exploiting the latest max-severity ConnectWise bug is ’embarrassingly easy’

February 21, 2024 at 12:49PM A critical RCE vulnerability in ConnectWise’s ScreenConnect requires urgent patching due to its severity. The exploit allows an attacker to compromise user accounts and gain admin access, potentially leading to RMM tool attacks. The company has released patches, urging immediate updates due to the high risk of attacks. Limited threat … Read more

SmartScreen Vulnerability: CVE-2024-21412 Facts and Fixes

February 13, 2024 at 03:16PM Microsoft issued a patch for CVE-2024-21412, a zero-day SmartScreen vulnerability used by the Water Hydra APT group to target financial market traders. Trend Micro protects customers from this, emphasizing the importance of proactive cybersecurity measures and a dedicated bug bounty program. Trend customers have been protected since January 17 via … Read more

CMMC Is the Starting Line, Not the Finish

February 1, 2024 at 10:09AM The Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) is a significant nudge for companies in the defense industrial base and critical infrastructure to enhance cybersecurity. However, achieving CMMC compliance alone may not safeguard against sophisticated threats such as China’s PLA Unit 61398. To truly protect against cyber threats, companies … Read more

Trend Micro’s Bug Bounty Program ZDI 2023 Performance

January 12, 2024 at 12:11AM Trend Micro’s Zero Day Initiative (ZDI) disclosed 1,913 bugs in 2023 with 74% rated as Critical/High risk. The program identified vulnerabilities in attacks using zero-day exploits and provided early virtual patches to protect customers. ZDI also contributed 20% of bugs to Microsoft and 78% to Adobe, supporting both vendors in … Read more