Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Data Sheet
TPRM Professional Services
April 4, 2022Harness the power of vendor risk experts
More DetailsServices, Third-Party Risk Management -
Data Sheet
How To Prepare For The Digital Operational Resilience Act (DORA)
July 25, 2023The Digital Operational Resilience Act (DORA) is a pivotal piece of legislation aimed at strengthening the digital resilience of regulated financial entities in the European Union, including: credit institutions, investment firms, insurers, and more. Included in DORA are five key pillars that will shape how these organizations manage Information and Communication technology (ICT) and cyber risks.
More DetailsDORA, Security Ratings, Third-Party Risk Management -
Ebook
5 Steps to Avoid Cyber Incident
March 10, 2023According to a recent Gartner report, by 2025, a lack of talent or human failure will be responsible for over half of significant cyber incidents. And with the average cost of a data breach now at $4.35 million, it’s time for organizations to take proactive measures to protect themselves against cyber threats. This ebook was written with experts from SecurityScorecard’s Digital Forensics and Incident Response team, who have decades of experience working with companies to respond to cyber incidents. Here, these experts provide practical guidance for protecting your organization against cyber threats and mitigating their associated risks for CEOs and CISOs.
More DetailsCyber Insurance -
Research
Cyentia Fast And Frivolous
June 6, 2022Pacing Remediation of Internet-Facing Vulnerabilities
More Details -
Research
How to Analyze JavaScript Malware – A Case Study of Vjw0rm
January 10, 2023Vjw0rm is a worm that spreads via USB drives and has RAT capabilities because it implements different commands transmitted by the C2 server. It establishes persistence on a machine by copying to the Startup folder and creating a Run registry entry. The malware drops a Java-based RAT called STRRAT, executed using the Java executable that can be found on the local computer or downloaded from a remote URL.
More DetailsVlad Pasca
-
Research
A Technical Analysis Of The Royal Ransomware
November 14, 2022This malware encrypts files with the AES algorithm, either fully or partially. The extension of the affected files changes to “.royal”. Find out more in this technical analysis of the Royal Ransomware from SecurityScorecard’s Senior Malware Analyst, Vlad Pasca.
More DetailsVlad Pasca
-
Ebook
DORA: A Journey To Cyber Resilience
September 6, 2023In January 2023, a pivotal regulation took center stage for the European Union (EU) financial services sector. The Digital Operational Resilience Act (DORA) emerged as a requirement, ushering in a new era of cybersecurity.
More DetailsDORA -
Data Sheet
Achieve DORA Compliance with SecurityScorecard
July 25, 2023SecurityScorecard offers a comprehensive solution for adhering to all major aspects of DORA, enabling your organization to minimize ICT risk exposures, build a resilient digital supply chain, and avoid non-compliance penalties.
More DetailsDORA, Security Ratings, Supply Chain Cyber Risk -
Data Sheet
How Does Scoring Work?
July 14, 2022SecurityScorecard non-intrusively scans the entire IPv4 webspace at a regular cadence. Cloud-based assets are scanned every two hours. Other assets are scanned at a slower pace. In addition, we use domain name system (DNS) records, domain registration information, transport layer security (TLS) certificates, and other data sources to find related domains and subdomains belonging to an organization
More DetailsSecurity Ratings