Hersteller / Partner-News
Don’t just shift left, level up: Building a modern cyber defense program
Within the security community of late, the focus has been on “shifting left”, and while that has merit, it is somewhat myopic missing some of the realities of defense in practice. Instead, I propose a simple framework to help guide initiatives that will “level up” defenses and greatly improve sec...
How RangeForce Delivers Measurable Cyber Readiness Results in 30 Days
In today's rapidly evolving cybersecurity landscape, organizations must continuously refine their defensive capabilities to stay ahead of threats. Traditional perimeter defenses are no longer sufficient as advanced and persistent threats continue to bypass these security measures. At Range...
2023 Cofense Phishing Intelligence Trends Review: Q2
Executive Summary Each quarter, Cofense Intelligence has analyzed malware and credential phishing emails that reached users in environments protected by SEGs. This quarter we saw increases in credential phishing, Supermailer campaigns, NetSupport Manager RAT campaigns, and compromised domains to...
Trojanized Super Mario Bros installer spreads malware
Researchers have discovered a Trojanized Super Mario Bros game installer that delivers multiple forms of malware, including an XMR miner, SupremeBot mining client and Umbral Stealer. Attackers bundled the malicious code with a legitimate installer file named "super-mario-forever-v702e." G...
The Spies Who Loved You: Infected USB Drives to Steal Secrets
In the first half of 2023, Mandiant Managed Defense has observed a threefold increase in the number of attacks using infected USB drives to steal secrets. Mandiant tracked all of the cases and found that the majority of the incidents could be attributed to several active USB-based operation campa...
Detecting Microsoft Exchange Zero-Day Exploits
What is a Zero-Day Exploit? What Can be Done About Them? In cybersecurity, a zero-day exploit refers to the method a hacker uses to take advantage of a security vulnerability in a computer system, software, or network. When a zero-day vulnerability is discovered, both defenders and hackers rush ...
Gartner® Recognizes CounterCraft as the Sole Deception Vendor for Cyber-Physical System Security
Gartner predicts 30% of critical infrastructure organizations will experience a security breach by 2025. Why? The use of outdated and physically isolated devices makes these environments vulnerable to insider threats and external breach attempts. This is one of the reasons why, in a recent repor...
Creating a Culture of Awareness: 12 Key Practices to Follow (and Avoid)
Developing an organization that is resilient to ever evolving email threats comes from building a strong and effective security awareness program. But how do you go about this, what does it include, and more importantly, what should you avoid? Below we’ve set out the ultimate guide featuring the ...
Guide to Building a Cybersecurity Incident Response Plan [Part 1]
Cybersecurity incidents are a fact of life in today’s digital world. Every day, organizations of all sizes are targeted by hackers and other cyber criminals. In 2022, there were over 600 billion cyberattacks worldwide, and the number is only expected to grow in the coming years.
Improving the SOC Analyst Experience
It’s essential to continuously improve the analyst experience (AX) and maximize the team’s efficiency when protecting the organization. Focusing on what matter the most to security analysts and making their job easier can also reduce burnout and help you retain top talent.
Anstehende Termine für Events und Veranstaltungen der ectacom GmbH: Schulungen, Workshops und mehr…
Messe Nürnberg, Messezentrum 1 90471 Nürnberg, Germany
Datum: 10. Oktober 2023, 09:00
Datum: 13. November 2023, 17:00