Introducing MAX — Take supply chain cyber risk management to the MAX
SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog, Learning Center
Defender for Endpoint: Transforming Endpoint Security with Advanced Threat Protection
March 8, 2024Explore how Microsoft's Sentinel transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Blog, Learning Center
What is Sentinel? Harnessing the Power of Cloud-Native SIEM for Modern Cybersecurity Challenges
March 6, 2024Explore how Microsoft's Sentinel SIEM solution transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Blog, Learning Center
SMB Port Numbers: A Guide to Optimizing and Securing Your Network
March 6, 2024Explore SMB port security and optimization for your network, including risks and best practices for safeguarding your digital infrastructure.
More DetailsTech Center -
Blog
New Malware Attributed to Russian Hacking Group APT28
March 6, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting Ukrainian state organizations attributed to the Kremlin-backed nation-state group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP,” detailed in this whitepaper.
More DetailsCyber Threat Intelligence -
Blog, Learning Center
Proactive Strategies to Prevent Ransomware Attacks
March 4, 2024Essential strategies to protect your organization from ransomware attacks, including defense mechanisms, regular updates, & employee training.
More DetailsAttack Surface Management, Tech Center -
Blog
SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
February 28, 2024The SecurityScorecard Global Third-Party Breach Report uses the world's largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups.
More DetailsPaul Prudhomme, STRIKE Threat Intelligence Analyst
Cyber Threat Intelligence, Supply Chain Cyber Risk -
Blog, Learning Center
Implementing Non-Repudiation in Your Security Strategy: Best Practices and Techniques
Explore best practices for implementing non-repudiation in security strategies to ensure transaction authenticity and protect against fraud.
More DetailsTech Center -
Blog, Learning Center
Securing Port 139: Strategies to Prevent Unauthorized Access and Cyber Threats
Discover how to secure Port 139 against cyber threats with SMB protocol security, preventing unauthorized access and ensuring network safety.
More DetailsTech Center -
Blog, Learning Center
The Essential Guide to SMB Port Configuration for Enhanced Network Security
Master SMB port configuration for network security with our guide. Learn to protect against cyber threats and enhance operational safety efficiently
More DetailsTech Center -
Blog, Learning Center
Port 445: Understanding Its Role in Cyber Attacks and Strategies for Defense
Explore how to secure Port 445 against cyber threats. This guide covers the role of Port 445 in cyber attacks and outlines defense strategies to protect your network.
More DetailsTech Center -
Blog, Learning Center
Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk
February 22, 2024Ask these ten key questions to make sure your organization’s vendor questionnaire doesn't become just a “check-the-box” exercise.
More DetailsSupply Chain Cyber Risk, Tech Center -
Blog
Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group
February 22, 2024After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit
More DetailsRob Ames, Senior Staff Threat Researcher; James Niven, Senior Staff Threat Researcher
Cyber Threat Intelligence