Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Operation Phantom Circuit:  North Korea’s Global Data Exfiltration Campaign

January 29, 2025

Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.
STRIKE Team
5 Reasons to Integrate Continuous Monitoring into Your TPRM Program

January 21, 2025

5 Reasons to Integrate Continuous Monitoring into Your TPRM Program
Learn 5 reasons your organization should integrate continuous monitoring into their third-party risk management program. Read SecurityScorecard’s blog
What is the Threat Landscape?

January 17, 2025

What is the Threat Landscape?
Discover the current threat landscape and learn how to identify, assess, and mitigate evolving cyber risks to protect your organization from potential attacks.
What Is an Attack Vector? 20 Common Ways Hackers Break In and How to Prevent Them

January 16, 2025

What Is an Attack Vector? 20 Common Ways Hackers Break In and How to Prevent Them
Learn the 20 most common attack vectors hackers use to breach organizations and the best prevention strategies cybersecurity teams can adopt today.
Attack Surface Management
Tech Center
Operation 99: North Korea’s Cyber Assault on Software Developers

January 15, 2025

Operation 99: North Korea’s Cyber Assault on Software Developers
On January 9, the SecurityScorecard STRIKE team uncovered Operation 99, a cyberattack by the Lazarus Group, North Korea’s state-sponsored hacking unit.
STRIKE Team
How Security Ratings Help Build Strong Business Relationships

January 14, 2025

How Security Ratings Help Build Strong Business Relationships
See how security ratings allow you to strengthen business relationships by giving you the information you need to enable stronger business outcomes. Learn more about security ratings for business.
Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare

January 14, 2025

Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare
Patient data is among the most sensitive and valuable information in the healthcare industry. A single breach can have devastating consequences. Learn how a managed service for SCDR can help.
Threat-Informed TPRM
Securing Your Financial Ecosystem: A Guide to TPRM Managed Services

January 10, 2025

Securing Your Financial Ecosystem: A Guide to TPRM Managed Services
Learn more about the critical role of Managed Services for Third-Party Risk Management (TPRM) for your financial institution.
Threat-Informed TPRM
Day in the Life of a CISO: A Vendor Breach: Assessing Our Exposure

December 19, 2024

Day in the Life of a CISO: A Vendor Breach: Assessing Our Exposure
Day in the Life of a CISO: A Vendor Breach: Assessing Our Exposure
Scorecarder Spotlight: Portia Phillips

December 17, 2024

Scorecarder Spotlight: Portia Phillips
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Portia Phillips!
Scorecarder Spotlight
Securing Your Healthcare Supply Chain: A Guide to Supply Chain Detection and Response

December 17, 2024

Securing Your Healthcare Supply Chain: A Guide to Supply Chain Detection and Response
In today’s interconnected healthcare landscape, supply chain security has emerged as a critical concern. Cyber threats are becoming increasingly sophisticated, targeting vulnerable points in the supply chain to infiltrate networks and steal sensitive patient data. As a result, healthcare organizations must prioritize the security of their vendors and partners to protect their own operations and patient information.
Healthcare
Threat-Informed TPRM
A Day in the Life of a CISO: An Employee Email Discovered in a Password Dump

December 13, 2024

A Day in the Life of a CISO: An Employee Email Discovered in a Password Dump
A Day in the Life of a CISO: An Employee Email Discovered in a Password Dump
Day in the Life of a CISO: Evaluating a Plugin Vendor

December 13, 2024

Day in the Life of a CISO: Evaluating a Plugin Vendor
Day in the Life of a CISO: Evaluating a Plugin Vendor
How SecurityScorecard’s Supply Chain Detection and Response Protects Financial Institutions

December 12, 2024

How SecurityScorecard’s Supply Chain Detection and Response Protects Financial Institutions
As financial institutions continue to expand their digital ecosystems, the growing reliance on third-party vendors and service providers introduces significant cyber risks.
Grow Your MSP Practice with SecurityScorecard MAX

December 3, 2024

Grow Your MSP Practice with SecurityScorecard MAX
Transform vendor security into recurring revenue. SecurityScorecard MAX helps MSPs protect client supply chains with enterprise-grade tools, expert support, and automated risk management.
2025 Security Predictions: The Forces Reshaping Cybersecurity

November 25, 2024

2025 Security Predictions: The Forces Reshaping Cybersecurity
What worked in 2024 may not protect you in 2025. Our experts outline what to expect and highlight hidden vulnerabilities to address to keep your company safe from attackers here.
Executive Viewpoint
Supply Chain Cyber Risk
Third-Party Risk Management
Scorecarder Spotlight: Fabio da Cruz Maciel

November 20, 2024

Scorecarder Spotlight: Fabio da Cruz Maciel
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Fabio da Cruz Maciel!
Vendor Risk Management: The Definitive Guide in 2025

November 18, 2024

Vendor Risk Management: The Definitive Guide in 2025
Learn how effective vendor risk management protects your business from cybersecurity threats, compliance failures, and operational disruptions.
What Is Cyber Risk Management?

November 18, 2024

What Is Cyber Risk Management?
Learn what cyber risk management is and why it’s essential for protecting digital assets, reducing threats, and ensuring business resilience.
A Day in the Life of a CISO: Tackling a Major Vulnerability with Precision

November 18, 2024

A Day in the Life of a CISO: Tackling a Major Vulnerability with Precision
A Day in the Life of a CISO: Tackling a Major Vulnerability with Precision
A Day in the Life of a CISO: Turning Data into Boardroom Confidence

November 18, 2024

A Day in the Life of a CISO: Turning Data into Boardroom Confidence
A Day in the Life of a CISO: Turning Data into Boardroom Confidence