Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
July 6, 2023
What is Threat Intelligence in Cybersecurity?
Threat intelligence helps you understand, prevent, and mitigate cyber threats. Learn how threat intelligence can benefit your business.
Tech Center
June 23, 2023
Fortinet Fortigate Vulnerability CVE-2023-27997: How to Surface Exposed Devices and Mitigate the Threat
Recently, a critical vulnerability tracked as CVE-2023-27997 was identified in Fortinet Fortigate appliances. This vulnerability has been exploited by the Chinese APT group Volt Typhoon, among others, targeting governments and organizations worldwide. \r\n\r\nAs a result, Fortinet has released an urgent patch for affected systems. For a more detailed understanding of this vulnerability and the corresponding patch, you can read this Fortinet blog post.\r\n
Cyber Threat Intelligence
June 22, 2023
Cybersecurity Risk is a Business Risk: Upcoming SEC Regulations Make Security Transparency Mandatory
During an interview on Nasdaq Trade Talks, SecurityScorecard CEO, Aleksandr Yampolskiy, discussed the impact of upcoming regulations by the SEC.
Services
June 20, 2023
SecurityScorecard Identifies Infrastructure Linked to Widespread MOVEit Vulnerability Exploitation
SecurityScorecard shares its findings into a widespread MOVEit exploit which affected a number of high profile organizations.
Cyber Threat Intelligence
June 7, 2023
Three Steps to Prevent a Cybersecurity Breach from MOVEit Exploit: SecurityScorecard’s investigation into Zellis reach uncovers 2,500 exposed MOVEit servers across 790 organizations
Learn about SecurityScorecard’s investigation into the Zellis breach, which uncovered over 2.500 vulnerable servers across 790 organizations.
Cyber Threat Intelligence
May 16, 2023
SecurityScorecard’s Partnership with the TSA Helping to Secure the Nation’s Critical Infrastructure
As part of our continued commitment to making the world a safer place, SecurityScorecard recently partnered with the Transportation Security Administration (TSA). This partnership will enable the agency to more accurately monitor and assess the cyber health of the nation’s pipeline, rail, and aviation transportation systems.
April 14, 2023
Prepare for Zero-Day Threats: Military and Private Sector Leaders Share Their Insights
Leading cybersecurity experts Major General John F. Wharton, (US Army retired); Oleg Strizhak, Shell’s Digital Supply Chain Risk Manager; and Sam Curry, the CISO of Zscaler, recently sat down with SecurityScorecard’s President of International Operations Matthew McKenna to discuss how organizations can prepare themselves and their supply chains for zero-day attacks, preventing and responding to them, as well as best practices for supply chain risk management.
Cyber Threat Intelligence
Public Sector
April 12, 2023
7 Factors that Drive Cyber Risk: New Research from Marsh McLennan and SecurityScorecard
Cyber risk is dynamic and influenced by a wide range of variables, quantifying it requires numerous, continuously updated data points.
Cyber Insurance
April 4, 2023
6 Ways To Use SecurityScorecard APIs and Integrations
Optimize your security workflows and deliver intelligence with the largest ecosystem of integrated technology partners. Learn more.
Security Ratings
February 7, 2023
SecurityScorecard releases list of Killnet open proxy IP addresses
In the wake of Killnet’s latest DDoS attack on U.S. hospitals on January 30, SecurityScorecard has made its KillNet open proxy IP blocklist available to the public. This list is the product of the SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team’s ongoing research into KillNet. We released this list to help organizations better defend themselves against KillNet and other groups like it by preventing traffic from exploitable assets. In this blog, we’ll explain how we developed this proxy list and our recommendations for preventing DDos attacks.
Cyber Threat Intelligence
February 1, 2023
Close Encounters of the Third- (and Fourth-) Party Kind: The Blog
Let’s dive deeper into some other insights that help us understand the true extent of exposure from third- and fourth-party relationships.
Supply Chain Cyber Risk
January 20, 2023
Enterprise Cybersecurity: What it is & Why it’s Important
Having effective enterprise cybersecurity is more than having your employees create a password that isn’t their pet’s name—unless perhaps their cat’s name is at least 12 characters long, and a combination of upper- and lower-case letters and symbols. Whether it’s well-researched spearphishing attempts or bypassing MFA, threat actors have only… Read More
Tech Center
December 7, 2022
Hackers Are Using These 3 Techniques to Bypass MFA
Multi-factor authentication (MFA) is an essential security measure, but here are some frequently-used methods cyber-attackers leverage to bypass MFA.
Tech Center
November 30, 2022
9 Steps to Mitigate Ransomware Attacks for Your Business
Ransomware attacks are a top concern for many businesses as the threat landscape expands. Follow these 9 steps to help mitigate the risk for your business.
Tech Center
November 21, 2022
Mobile Device Forensics: Challenges, Threats, & Solutions
Mobile device forensics can help you recover lost or deleted data, as well as investigate a potential mobile security breach. Learn more.
Tech Center
October 19, 2022
What Drives Cyber Risk? Cyber Insurers and SecurityScorecard Reveal Answers
Seeking to stay ahead of hackers, many researchers have asked themselves what drives cyber risk. And many cyber insurance carriers have wondered how to accurately underwrite and price the risk. According to preliminary results from SecurityScorecard’s joint work with our cyber insurance partners, the answer is clear but multi-faceted.
Cyber Insurance
October 6, 2022
What is Cyber Risk Quantification? A Comprehensive Guide
Cyber risk quantification is the process of quantifying cyber risk by putting a monetary value on the potential impact of each prospective threat. Learn more.
Cyber Insurance
Executive Viewpoint
Tech Center
October 6, 2022
What is Cyber Risk Quantification? A Comprehensive Guide
Cyber risk quantification is the process of quantifying cyber risk by putting a monetary value on the potential impact of each prospective threat. Learn more.
Cyber Insurance
Executive Viewpoint
Tech Center
September 28, 2022
SecurityScorecard Partners with JCDC to Democratize Continuous Monitoring and Cybersecurity Risk Management
Cybersecurity is a team sport, and SecurityScorecard is proud to partner with the Joint Cyber Defense Collaborative (JCDC) to share cyber threat information in defense of public and private critical infrastructure.
Public Sector
September 6, 2022
TTPs Associated With a New Version of the BlackCat Ransomware
In this post, we describe a real engagement that we recently handled by giving details about the tools, techniques, and procedures (TTPs) used by this threat actor.
Cyber Threat Intelligence
STRIKE Team
August 31, 2022
Analysis of APT35 infrastructure reveals interest in Egyptian Shipping Companies
Executive Summary SecurityScorecard has identified domains resolving to Iran-linked Advanced Persistent Threat (APT) infrastructure, likely to be used to support phishing campaigns against Egypt-based shipping and marine services companies. In at least three instances, Iran-linked APT actors may have gained unauthorized access to the DNS configuration of legitimate domains to… Read More
STRIKE Team