-
LevelBlue SOC Analysts See Sharp Rise in Cyber Threats: Stay Vigilant
This holiday season our SOC analysts have observed a sharp uptick in cyber threat activity. Specifically, they’ve seen a rise in attempted ransomware attacks, which started during the American Thanksgiving holiday period (November 25–31, 2024) and are expected to continue throughout the holiday season. We’re sharing details on the threat actors involved, their tactics, as…
-
What Is a Brute Force Attack?
In the ever-evolving landscape of cybersecurity, threats continue to become more sophisticated and pervasive. Among various cyber threats, brute force attacks stand out due to their simplicity and effectiveness. Despite being a basic form of attack, they remain a significant threat to businesses. This blog aims to demystify brute force attacks, explore their various forms,…
-
Patch or Perish: The Forgotten Virtue of Diligence in Digital Security
In the ever-evolving landscape of digital security, the adage “patch or perish” encapsulates a stark reality. The timely application of software patches is not just a best practice—it is a necessity. The vulnerabilities that lurk in unpatched software can serve as gateways for cybercriminals, leading to severe breaches, operational disruptions, and substantial financial losses. The…
-
How Regional Service Providers Can Grab a Larger Share of the Cybersecurity Market
Security leaders continue to be under intense pressure. Increasingly, they are turning toward third parties for support and expertise as their cybersecurity woes become more dire and it becomes harder to recruit and retain talent. This is reflected in the projected growth for cybersecurity services through 20281 (managed security services, managed detection and response, security…
-
Best Ways to Reduce Your Digital Footprint Now
Every activity you perform online, whether it is commenting on a news article, sharing something on social media or your shopping preferences leaves a digital footprint. This digital trail helps organizations find more about you. And while it does offer a certain degree of convenience, it can be a real hazard to your online privacy.…
-
What Are Computer Worms?
In today’s interconnected digital world, businesses are constantly under threat from cybercriminals seeking to exploit vulnerabilities in systems, networks, and devices. One of the most persistent and silent threats that organizations face is computer worms. These malicious programs can spread across networks, infecting systems autonomously and wreaking havoc before a user even realizes something is…
-
DSPM vs CSPM: Key Differences and Their Roles in Data Protection
It’s becoming increasingly challenging to secure sensitive data. Cybercriminals are becoming more sophisticated, IT infrastructure is becoming more complex, and attack surfaces are increasing. With so much data now stored off-premises, organizations must protect not only their sensitive information but also the platforms that house it. This is where data security posture management (DPSM) and…
-
Stories from the SOC: Registry Clues to PDF Blues: A Tale of PUA Persistence
Executive Summary Establishing persistence on a system allows a threat actor continued access or process execution across system restarts or other changes. For this reason, monitoring for and investigating persistence indicators are key components of any robust cybersecurity platform. Two common persistence techniques are using AutoStart Execution of programs during system boot or logon (T1547)…
-
Enhancing Cyber Resilience in US SLED Organizations
2024 Cyber Resilience Research Unveils US SLED Sector Challenges New data illuminates how US SLED leaders can prioritize resilience. US SLED (State, Local, and Higher Education) organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks…
-
Active Directory Certificate Services 101: An Overview
59% of professionals interviewed in 2024 struggle with orchestrating their PKI. Enter Active Directory Certificate Services, which, when paired with the right certificate management approach, empowers even smaller organizations to… The post Active Directory Certificate Services 101: An Overview appeared first on InfoSec Insights. 59% of professionals interviewed in 2024 struggle with orchestrating their PKI.…