Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Ebook
5 Steps You Can Take To Boost Your Boards Involvement And Stay Compliant
September 11, 2023PoshC2 is an open-source C2 framework used by penetration testers and threat actors. It can generate a Powershell-based implant, a C#.NET implant that we analyze in this paper, and a Python3 implant. The malware retrieves the current Windows user, the network domain name associated with the current user, the computer name, the processor architecture, the current process name and id, and the path of the Windows directory. The network communication is encrypted using the AES algorithm with a hard-coded key that can be changed by the C2 server. The C# implant can load and execute modules in memory without touching the disk by using multiple commands. It can perform post-exploitation activities by loading tools such as SharpHound, Rubeus, SharpView, and Seatbelt.
More DetailsVlad Pasca
-
Learning Center
The Top 7 Cyberattacks on U.S. Government A closer look at the evolving landscape of cybersecurity
September 9, 2023Cyberattacks are an increasingly significant threat to governments worldwide. This blog post examines some of the top cyberattacks on US government.
More DetailsPublic Sector, Tech Center -
Data Sheet
Top 10 Security Questions Asked By Board Members
September 8, 2023What are the top questions board members ask of their organizations security? We've compiled 10 common questions with strategies to address their concerns.
More DetailsExecutive Viewpoint -
Webinar
Customer Insights Webinar: Take More Control of Your Score with Custom Scorecard
September 7, 2023More Details -
Ebook
DORA: A Journey To Cyber Resilience
September 6, 2023In January 2023, a pivotal regulation took center stage for the European Union (EU) financial services sector. The Digital Operational Resilience Act (DORA) emerged as a requirement, ushering in a new era of cybersecurity.
More DetailsDORA -
Data Sheet
Fast, Easy, Collaborative Refute Process
August 30, 2023Adjust your ratings with a fast, easy, and collaborative refute process
More DetailsSecurity Ratings -
Data Sheet
Your cybersecurity journey begins with trust
August 30, 2023The Trust Portal serves as a single source of truth when looking for answers to questions about the validity and accuracy of our ratings, scoring methodology and data collection processes, and how we comply with industry standards and regulations.
More DetailsSecurity Ratings -
Infographic
5 Tips To Know You Are Using Data You Can Trust
August 30, 2023Organizations need to trust their data and be confident that their customers, clients, and vendors can trust it as well. This means knowing that it’s accurate, reliable, and secure. Here are 5 questions to ask to help you know you have data you can trust.
More Details -
Data Sheet
Discover what customers love about SecurityScorecard
August 30, 2023Read how organizations use the SecurityScorecard platform to fit their specific needs, while improving visibility, and saving time and resources.
More DetailsSecurity Ratings -
Ebook
5 Tips To Know You Are Using Data You Can Trust
August 30, 2023Organizations need to trust their data and be confident that their customers, clients, and vendors can trust it as well. This means knowing that it’s accurate, reliable, and secure. How can this be accomplished?
More Details -
Ebook
4 Factors To Consider When Evaluating A Cybersecurity Partner
August 30, 2023How should you evaluate a partner you work with? This guide can help you make informed choices about business partners.
More Details