
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is Domain Hijacking and How Do I Prevent it?
March 7, 2024Your domain name is not just a web address; it represents your brand, your reputation, and often, your livelihood. However, with the increasing value of domain names, they have become targets for cybercriminals seeking to exploit vulnerabilities for their gain. One such threat is domain hijacking – a serious issue that can have significant repercussions if not addressed promptly. Here, we'll delve into what domain hijacking entails and explore practical steps to prevent it from happening to you.
More DetailsTech Center -
Webinar
Red Sift Rising: Tools to Level Up Your Cybersecurity Rating
March 7, 2024More DetailsSecurity Ratings -
Blog, Learning Center
What is Sentinel? Harnessing the Power of Cloud-Native SIEM for Modern Cybersecurity Challenges
March 6, 2024Explore how Microsoft's Sentinel SIEM solution transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Blog
New Malware Attributed to Russian Hacking Group APT28
March 6, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting Ukrainian state organizations attributed to the Kremlin-backed nation-state group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP,” detailed in this whitepaper.
More DetailsCyber Threat Intelligence -
Webinar
The Future of Supply Chain Cybersecurity: Navigating the Evolving Landscape
March 5, 2024More DetailsExecutive Viewpoint, Supply Chain Cyber Risk -
Research, White Paper
A technical analysis of the APT28’s backdoor called OCEANMAP
March 5, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting state organizations attributed to the Russian espionage group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP.” Download this whitepaper to explore a technical analysis of APT28’s tactics, techniques, and procedures.
More DetailsVlad Pasca
Cyber Threat Intelligence, Enterprise Cyber Risk, Supply Chain Cyber Risk -
Learning Center
Leveraging SIEM Splunk for Enhanced Cybersecurity: A Comprehensive Guide
March 4, 2024In this comprehensive guide, we'll delve into the world of SIEM Splunk and explore how organizations can leverage it to enhance their cybersecurity posture.
More DetailsTech Center -
Learning Center
Analyzing FERPA Violation Examples to Strengthen Data Privacy in Education
March 4, 2024The Family Educational Rights and Privacy Act (FERPA) is a crucial piece of legislation designed to safeguard students' educational records. Despite its importance, FERPA violations still occur, highlighting the need for continuous vigilance and proactive measures to strengthen data privacy in education.
More DetailsTech Center -
Blog, Learning Center
Proactive Strategies to Prevent Ransomware Attacks
March 4, 2024Essential strategies to protect your organization from ransomware attacks, including defense mechanisms, regular updates, & employee training.
More DetailsAttack Surface Management, Tech Center -
Blog
SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
February 28, 2024The SecurityScorecard Global Third-Party Breach Report uses the world's largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups.
More DetailsPaul Prudhomme, STRIKE Threat Intelligence Analyst
Cyber Threat Intelligence, Supply Chain Cyber Risk -
Press
SecurityScorecard Third-Party Breach Report Reveals Software Supply Chain as Top Target for Ransomware Groups
February 28, 2024SecurityScorecard today released its Global Third-Party Cybersecurity Breach Report. Using the world’s largest proprietary risk and threat data set, SecurityScorecard STRIKE threat hunters analyzed threat groups' mass exploitation of supply chain vulnerabilities.
More Details -
Research
Global Third-Party Cybersecurity Breach Report
February 28, 2024In-depth analysis of the most significant third-party cyber risks and incidents in 2023
More DetailsServices, Supply Chain Cyber Risk