Block This Now: Cobalt Strike and Other Red-Team Tools

Block This Now: Cobalt Strike and Other Red-Team Tools

Application Security , Cybercrime , Cybercrime as-a-service Attackers Keep Wielding Legitimate Tools and ‘Living Off the Land’ Tactics Mathew J. Schwartz (euroinfosec) • December 31, 2021     Attackers continue to use the legitimate Cobalt Strike tool set to target victims. Many attackers – highly skilled or otherwise – employ “living off the land” tactics, which means using legitimate tools or functionality already present in a network to target a victim. Accordingly, organizations need to…

Read More

16 Tools, Technologies And Strategies For MSPs To Fight Phishing Attacks

16 Tools, Technologies And Strategies For MSPs To Fight Phishing Attacks

Proofpoint Simulated Phishing Campaigns Mark Cooley, Vice President of Security and Compliance, Cedar Rapids, Iowa-based Involta, No. 255 on the 2021 CRN Solution Provider 500 Phishing attack prevention is all about end-user awareness and ongoing training. As I mentioned before, phishing attacks are a people and process vulnerability that is often overlooked. There are a variety of tools in the marketplace that companies can use to deploy…

Read More

The role of the CFO in enterprise cybersecurity

The role of the CFO in enterprise cybersecurity

The role of the CFO in enterprise cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Protecting hospitals from supply-chain counterfeits and other security threats

Protecting hospitals from supply-chain counterfeits and other security threats

Protecting hospitals from supply-chain counterfeits and other security threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Ransomware prevention tactics keep businesses healthy

Ransomware prevention tactics keep businesses healthy

Ransomware prevention tactics keep businesses healthy | 2021-07-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Is cyber insurance costing you 30% more?

Is cyber insurance costing you 30% more?

Is cyber insurance costing you 30% more? | 2021-07-07 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to infuse agility into security operations

How to infuse agility into security operations

How to infuse agility into security operations | 2021-06-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Preparing for the next elaborate cyberattack could put your organization at risk

Preparing for the next elaborate cyberattack could put your organization at risk

Preparing for the next elaborate cyberattack could put your organization at risk | 2021-05-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Ransomware Threats Are Everywhere. Here’s How to Fight Back.

Ransomware Threats Are Everywhere. Here’s How to Fight Back.

The cyber criminals are winning. After the recent spate of devastating attacks, experts say it’s only going to get worse from here, with hacking tools becoming increasingly available and high ransomware payments enticing more malicious actors and daring them to go after ever bigger targets. Corporations and governments need to act quickly and take concrete steps to counter the rising threat. The flurry of cyberattacks on critical infrastructure and government computer systems has been unprecedented. Late last year, victims…

Read More

Cybercriminals exploit these cognitive biases the most

Cybercriminals exploit these cognitive biases the most

Cybercriminals exploit these cognitive biases the most | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 21 22 23 24 25