A zero-day attack leaves your software vulnerable to being exploited by hackers. It is a serious security risk. Cybercriminals are becoming more and more adept at breaching IT security systems. The post 3 Ways File Integrity Monitoring Identifies Zero-Day Attacks…
Category: Security Boulevard
LockBit, RAGroup Drive Ransomware Attacks in March
Global ransomware attacks rose slightly in March compared to the previous month, as ransomware cabal RAGroup ramped up activity by more than 300%. However, overall activity declined 8% year-over-year, according to NCC Group’s latest ransomware report. The cyber gang LockBit…
RSAC 2024 Innovation Sandbox | RAD Security: New Solutions for Cloud-Native Anomaly Detection and Response
The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry. Today, let’s get to know the company RAD Security. Company…
MITRE ATT&CK v15: A Deeper Dive into SaaS Identity Compromise
The MITRE ATT&CK framework is a continually evolving resource, tracking the tactics, techniques, and procedures (TTPs) employed by adversaries across all phases of an attack. The recent v15 release brings valuable updates and Obsidian Security is honored to have contributed…
KapeKa Backdoor: Russian Threat Actor Group’s Recent Attacks
In the realm of cybersecurity, vigilance is paramount. Recent discoveries have shed light on a previously undisclosed threat known as Kapeka, a versatile backdoor quietly making its presence felt in cyber attacks across Eastern Europe. Let’s delve into the intricacies…
External Penetration Testing: Cost, Tools, Steps, & Checklist
External penetration testing is a critical cybersecurity practice that helps organisations defend their internet-facing assets. By simulating the actions of a real-world attacker, external penetration tests reveal vulnerabilities in your web applications, networks, and other externally accessible systems. This post…
USPS Phishing Scams Generate Almost as Much Traffic as the Real Site
Bad actors have long impersonated package delivery companies – including the U.S. Postal Service (USPS), FedEx, and UPS among them – in email and text-based phishing scams aimed at convincing unsuspecting targets to either send money or reveal personal information.…
Rubrik Sets Cyber Resiliency Course Following IPO
Rubrik aims to reduce the expertise that NetSecOps needs for an organization to recover from a ransomware attack. The post Rubrik Sets Cyber Resiliency Course Following IPO appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Thoma Bravo to Buy Cybersecurity Firm Darktrace for $5.3 Billion
Private equity firm Thoma Bravo is adding to its already significant portfolio of cybersecurity companies after an agreement reached with Darktrace’s directors to buy the British AI-based security firm for more than $5.3 billion and take it private. Once the…
Orca Security Allies with ModePUSH for Cloud Incident Response
The alliance between the two companies promises to make it easier to triage, investigate, and respond to security incidents. The post Orca Security Allies with ModePUSH for Cloud Incident Response appeared first on Security Boulevard. This article has been indexed…