News Updates

The SolarWinds SEC Charges: A Wake-Up Call for Strong Cybersecurity Practices

The recent SEC charges against SolarWinds Corporation serve as a reminder of the importance of durable cybersecurity measures. This event has far-reaching implications for businesses across sectors, so let’s get into it. The SolarWinds Case: What Happened? The U.S. Securities and Exchange Commission has charged SolarWinds and its Chief Information Security Officer for fraud and …

The SolarWinds SEC Charges: A Wake-Up Call for Strong Cybersecurity Practices Read More »

APT Activity in Microsoft Exchange Online

The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) recently released a joint Cybersecurity Advisory (CSA) after observing malicious activities in Microsoft 365 (M365) audit logs in a Federal Civilian Executive Branch (FCEB) agency. The advisory encourages agencies and critical infrastructure organizations to enhance their cybersecurity posture by implementing recommended logging measures. …

APT Activity in Microsoft Exchange Online Read More »

The Double-Edged Sword of Automation: Cybercriminals Now Craft Scams in Minutes

According to Group-IB, a leading cyber analyst group, the rapid pace of automation advancements has significantly shortened the time it takes for cybercriminals to orchestrate elaborate scams, reducing the process to a mere ten minutes. This alarming development is a stark reminder of how transformative technologies while driving efficiency and productivity in legitimate industries, can …

The Double-Edged Sword of Automation: Cybercriminals Now Craft Scams in Minutes Read More »

Don’t be a Risky Business -Why Vendor Risk Assessments are Important

The What: Vendor risk assessments are an important part of managing the security and compliance of a company’s information technology systems. These assessments help organizations identify and mitigate risks associated with the use of third-party vendors and their products and services. In this article, we will discuss the reasons why a company should conduct vendor …

Don’t be a Risky Business -Why Vendor Risk Assessments are Important Read More »

IconBurst attack grabs data from multiple web apps (Supply Chain attack)

IconBurst: NPM software supply chain attack grabs data from apps, websites ReversingLabs researchers recently discovered evidence of a widespread software supply chain Iconburst attack involving malicious Javascript packages offered via the NPM package manager. Researchers at ReversingLabs identified more than two dozen NPM packages, dating back six months, that contain obfuscated Javascript designed to steal …

IconBurst attack grabs data from multiple web apps (Supply Chain attack) Read More »

Law Firms Under Cyber Attack

Law Firms under Cyber Attack Law firms are currently experiencing an alarming surge in cyberattacks, with five class-action lawsuits already filed this year. The firms are becoming a primary target due to the sensitive nature of the data they store, from employee personal data to proprietary client information, similar to how a vault attracts thieves. …

Law Firms Under Cyber Attack Read More »

SEC’s New Cybersecurity Mandate

The Securities and Exchange Commission (SEC) recently adopted new regulations requiring public corporations to disclose any cybersecurity breaches that could affect their financial health within four days, except in cases where disclosure would pose significant national security or public safety risks. The regulations, which were passed in a 3-2 vote, also stipulate that publicly traded …

SEC’s New Cybersecurity Mandate Read More »

Data Leak at VirusTotal

In a recent cybersecurity incident, an employee’s error led to the inadvertent exposure of personal data related to a subset of VirusTotal’s registered customers. This data included names and email addresses, with the database comprising approximately 5,600 names housed in a 313KB file. VirusTotal, a service widely used to detect malware and malicious content in …

Data Leak at VirusTotal Read More »