This Week in Security News – October 15, 2021

Actors target Huawei Cloud using upgraded Linux malware, 7-Eleven breached customer privacy by collecting facial imagery without consent and more. Read More HERE…

Read more

New Bill to Require Cyber Attack Reporting in the US Researcher

The Cyber Incident Notification Act of 2021 would also require CISA to launch a program that would notify organizations of various vectors that malicious actors exploit. Read More HERE…

Read more

Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound

Here is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, “Attacks From All Angles: 2021 Midyear Cybersecurity Report.” Read More HERE…

Read more

This Week in Security News – August 27, 2021 VP, Threat Intelligence

Key takeaways from H1’ 2021 Linux threat report and Google removes fake crypto-mining apps and more. Read More HERE…

Read more

LockBit Resurfaces With Version 2.0 Ransomware Detections in Chile, Italy, Taiwan, UK Threats Analyst Threats Analyst Threats Analyst Threats Analyst Threats Analyst Threats Analyst Threats Analyst

The ransomware group LockBit resurfaced in July with LockBit 2.0, with reports indicating an increased number of targeted companies and the incorporation of double extortion features. Our detections followed attack attempts in Chile, Italy, Taiwan, and the UK from July to August. Read More HERE…

Read more

Supply Chain Attacks from a Managed Detection and Response Perspective Threats Analyst Threats Analyst Threats Analyst Threats Analyst

In this blog entry, we will take a look at two examples of supply chain attacks that our Managed Detection and Response (MDR) team encountered in the past couple of months. Read More HERE…

Read more

Homeland Security Releases New Cybersecurity Rules

DHS’s second issue requires pipeline operators to implement various cybersecurity measures to protect their operations from cyber attacks. This directive also builds upon the department’s May directive following the Colonial Pipeline attack. Read More HERE…

Read more

Nefilim Ransomware Attack Through a MITRE Att&ck Lens

Follow the story of Company X as they suffer an attack from the notorious modern ransomware family, Nefilim, and their affiliates, to learn how you can better mitigate against the common tactic and techniques used in these attacks. Read More HERE…

Read more