Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Research
A Technical Analysis Of The Quasar Forked Rat Called Void Rat
July 17, 2023VoidRAT is based on the open-source RAT called Quasar. The malware steals information from web browsers and applications such as FileZilla and WinSCP. It also implements a keylogger functionality that saves and exfiltrates the pressed keys.
More Details -
Case Study
Avangrid
July 13, 2023There's a trust factor between my organization and Scorecard.
More Details -
Blog, Learning Center
What is Cyber Threat Hunting?
July 12, 2023Threat hunting is a strategy used to find threats before they can cause damage. Learn more about cyber threat hunting and how to incorporate it into your organization.
More DetailsCyber Threat Intelligence, Tech Center -
Learning Center
What is Threat Intelligence in Cybersecurity? A Comprehensive Overview
July 6, 2023Threat intelligence helps you understand, prevent, and mitigate cyber threats. Learn how threat intelligence can benefit your business.
More DetailsTech Center -
Case Study
RSUI
June 23, 2023Security ratings are critical to me as an underwriter because cyber landscape is continuously evolving
More DetailsCyber Insurance -
Blog, Learning Center
Fortinet Fortigate Vulnerability CVE-2023-27997: How to Surface Exposed Devices and Mitigate the Threat
June 23, 2023Recently, a critical vulnerability tracked as CVE-2023-27997 was identified in Fortinet Fortigate appliances. This vulnerability has been exploited by the Chinese APT group Volt Typhoon, among others, targeting governments and organizations worldwide. As a result, Fortinet has released an urgent patch for affected systems. For a more detailed understanding of this vulnerability and the corresponding patch, you can read this Fortinet blog post.
More DetailsCyber Threat Intelligence -
Webinar
Fighting Together: TSA, Critical Infrastructure, And Cyber Risk Management
June 22, 2023More DetailsPublic Sector -
Blog
Cybersecurity Risk is a Business Risk: Upcoming SEC Regulations Make Security Transparency Mandatory
June 22, 2023During an interview on Nasdaq Trade Talks, SecurityScorecard CEO, Aleksandr Yampolskiy, discussed the impact of upcoming regulations by the SEC.
More DetailsServices -
Research
Android Malware on the Rise – A case study of AhMyth RAT
June 21, 2023The malicious application is based on the open-source Android RAT called AhMyth. The following commands are implemented: taking pictures, exfiltrating phone call logs and phone contacts, stealing files and SMS messages from the phone, tracking the device’s location, recording audio, and sending SMS messages. The network communication with the C2 server is done by switching from HTTP to WebSocket via the Socket.IO library.
More DetailsVlad Pasca
-
Blog
SecurityScorecard Identifies Infrastructure Linked to Widespread MOVEit Vulnerability Exploitation
June 20, 2023SecurityScorecard shares its findings into a widespread MOVEit exploit which affected a number of high profile organizations.
More DetailsCyber Threat Intelligence