Tag: Storms
-
Sheltering From the Cyberattack Storm – Part Two
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate …
-
Sheltering from the Cyberattack Storm
As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain …
-
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets
Based on our estimates, from approximately April 2022 until November 2023, Pawn Storm attempted to launch NTLMv2 hash relay attacks through …
-
The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack
While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats) …
-
Microsoft hit by Storm season – a tale of two semi-zero days
At the tail-end of last week, Microsoft published a report entitled Analysis of Storm-0558 techniques for unauthorized email access. In …
-
Surviving the 800 Gbps Storm: Gain Insights from Gcore’s 2023 DDoS Attack Statistics
Gcore Radar is a quarterly report prepared by Gcore that provides insights into the current state of the DDoS protection market and …
-
#InfosecurityEurope: How to Weather the Coming Cybersecurity Storm
Resilience, collaboration and engagement will become vital for organizations hoping to weather a catastrophic cybersecurity “storm” …
-
The East Palestine, Ohio Train Derailment Created a Perfect TikTok Storm
The social media platform helped push the story into the mainstream while also fueling misinformation and conspiracy …
-
Threat Actor Deploys Raven Storm Tool to Perform DDoS Attacks
The threat actor dubbed ‘Mysterious Team’ has used the Raven Storm tool to conduct distributed denial-of-service (DDoS) attacks against …
-
CISA hosts Cyber Storm exercise with 200+ organizations
processes, procedures, and information sharing. It provides a venue for players to simulate the discovery of and response to a widespread …
-
Enterprises Are Sailing Into a Perfect Storm of Cloud Risk
In every cloud-based data breach we’ve learned about, misconfiguration mistakes played a central role. These misconfiguration “rogue …
-
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored …
●●●