
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog
Infosys McCamish Systems Third-Party Breach: Possible Attack Vectors and Infrastructure
March 12, 2024In response to the identification of Infosys McCamish Systems (IMS) as the point of origin for a third-party data breach claimed by the LockBit ransomware group, SecurityScorecard researchers reviewed findings on the security hygiene of IMS.
More DetailsRob Ames and Paul Prudhomme, Threat Research and Intelligence, SecurityScorecard
Cyber Threat Intelligence -
Blog
Forrester Includes SecurityScorecard in Cybersecurity Risk Ratings (CRR) Landscape Report
March 12, 2024To help sift through the ever-growing field of cybersecurity ratings, Forrester recently published The Cybersecurity Risk Ratings Platforms Landscape, Q1 2024. SecurityScorecard is proud to be included in this landscape, in the company of other notable vendors in the field. Once a misunderstood technology, Cybersecurity Risk Ratings platforms (CRRs) have earned their place in the spotlight in the last several years.
More DetailsBennett Morrison, Vice President of Product & Strategy
Security Ratings -
Webinar
Breaches Beyond Borders: A Deep Dive Into Third-Party Cybersecurity Breaches
March 12, 2024More DetailsSupply Chain Cyber Risk -
Blog, Learning Center
Defender for Endpoint: Transforming Endpoint Security with Advanced Threat Protection
March 8, 2024Explore how Microsoft's Sentinel transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Webinar
Red Sift Rising: Tools to Level Up Your Cybersecurity Rating
March 7, 2024More DetailsSecurity Ratings -
Blog, Learning Center
What is Sentinel? Harnessing the Power of Cloud-Native SIEM for Modern Cybersecurity Challenges
March 6, 2024Explore how Microsoft's Sentinel SIEM solution transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Blog
New Malware Attributed to Russian Hacking Group APT28
March 6, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting Ukrainian state organizations attributed to the Kremlin-backed nation-state group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP,” detailed in this whitepaper.
More DetailsCyber Threat Intelligence -
Webinar
The Future of Supply Chain Cybersecurity: Navigating the Evolving Landscape
March 5, 2024More DetailsExecutive Viewpoint, Supply Chain Cyber Risk -
Research, White Paper
A technical analysis of the APT28’s backdoor called OCEANMAP
March 5, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting state organizations attributed to the Russian espionage group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP.” Download this whitepaper to explore a technical analysis of APT28’s tactics, techniques, and procedures.
More DetailsVlad Pasca
Cyber Threat Intelligence, Enterprise Cyber Risk, Supply Chain Cyber Risk -
Learning Center
Leveraging SIEM Splunk for Enhanced Cybersecurity: A Comprehensive Guide
March 4, 2024In this comprehensive guide, we'll delve into the world of SIEM Splunk and explore how organizations can leverage it to enhance their cybersecurity posture.
More DetailsTech Center -
Learning Center
Analyzing FERPA Violation Examples to Strengthen Data Privacy in Education
March 4, 2024The Family Educational Rights and Privacy Act (FERPA) is a crucial piece of legislation designed to safeguard students' educational records. Despite its importance, FERPA violations still occur, highlighting the need for continuous vigilance and proactive measures to strengthen data privacy in education.
More DetailsTech Center -
Blog
SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
February 28, 2024The SecurityScorecard Global Third-Party Breach Report uses the world's largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups.
More DetailsPaul Prudhomme, STRIKE Threat Intelligence Analyst
Cyber Threat Intelligence, Supply Chain Cyber Risk