In Cisco Talos’ first episode of Talos Threat Perspective (TTP) episode, two Talos Threat Intelligence experts, Nick Biasini and James Nutland, discuss new research on the most prominent ransomware groups. They also pick three key topics and trends to focus on: initial access, differences among the groups, and the vulnerabilities they most heavily target. In their research, … [Read more...] about User Protection Suite Secures Against Talos Top Ransomware Attack Trends
top
China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz
Jan 30, 2024NewsroomMalware / Cyber Espionage The China-based threat actor known as Mustang Panda is suspected to have targeted Myanmar's Ministry of Defence and Foreign Affairs as part of twin campaigns designed to deploy backdoors and remote access trojans. The findings come from CSIRT-CTI, which said the activities took place in November 2023 and January 2024 after … [Read more...] about China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz
M-21-31 logging compliance: Overcoming the 3 top challenges
Recently, the US Government Accountability Office (GAO) released a study tracking US federal agencies’ progress on meeting the requirements set out in OMB M-21-31. Released in 2021, the Office of Management and Budget (OMB)’s M-21-31 memorandum provided guidance and requirements for federal agencies in order to improve centralized visibility into logging data before, during, … [Read more...] about M-21-31 logging compliance: Overcoming the 3 top challenges
Top 5 reasons to upgrade Elastic Security
Let’s start with assurances that we’re not here to heap anxiety on anyone’s fear of missing out. That being said, we do want to make sure you’re aware of all the goodness that is available in Elastic Security, especially if you’re on an older version. It can be hard to find time to dig into every new release, to see what new features might be available, or check on ways to … [Read more...] about Top 5 reasons to upgrade Elastic Security
Comparing Six Top Observability Software Platforms
When it comes to observability, your organization will have no shortage of options for tools and platforms. Between open source software and proprietary vendors, you should be able to find the right tools to fit your use case, budget and IT infrastructure.Observability should be cost-efficient, easy to implement and customers should be provided with the best support possible. … [Read more...] about Comparing Six Top Observability Software Platforms
Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges
Aug 04, 2023The Hacker News Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts. However, many security and identity teams face inherent obstacles during the PAM journey, hindering these solutions from reaching their full potential. These challenges deprive organizations of the resilience they … [Read more...] about Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges
Top Industries Significantly Impacted by Illicit Telegram Networks
In recent years the rise of illicit activities conducted within online messaging platforms has become a growing concern for countless industries. One of the most notable platforms that has been host to many malicious actors and nefarious activities has been Telegram. Thanks to its accessibility, popularity, and user anonymity, Telegram has attracted a large number of threat … [Read more...] about Top Industries Significantly Impacted by Illicit Telegram Networks
Top 5 SIEM Use Cases LogScale Solves
SIEMs play a crucial role in the modern SOC: They allow you to collect, correlate and analyze log data and alerts for security and compliance. Yet, despite their value, SIEMs have struggled to keep up with today’s logging performance and scalability requirements. Given that adversaries are operating faster than ever, organizations must prioritize the capabilities that help … [Read more...] about Top 5 SIEM Use Cases LogScale Solves
Top 6 security considerations for enterprise AI implementation
,As the world experiences the AI gold rush, organizations are increasingly turning to enterprise AI solutions to gain a competitive edge and unlock new opportunities. However, amid the excitement and potential benefits, one crucial aspect that must not be overlooked is data security — in particular, protecting against adversarial attacks and securing AI models. As businesses … [Read more...] about Top 6 security considerations for enterprise AI implementation
Four top tips for blockchain asset security
Cryptocurrencies and other blockchain assets aren’t protected by bank guarantees or other “traditional” financial security measures. Therefore, investors need to take every possible precaution to protect themselves. Here are four key tips for storing cryptocurrencies securely and protecting other cryptoassets. 1. Expect scams The variety of different cryptoassets combined with … [Read more...] about Four top tips for blockchain asset security