Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
WebinarInsights from the front lines: How to evaluate a partner you can trust [#1]
October 10, 2023More Details -
ResearchAttack Surface Intelligence Identifies Additional Cuba Ransomware-Linked Indicators of Compromise
September 28, 2023More Details -
Case StudyPrivate Equity Firm
September 21, 2023Private Equity Firm focused on the partner aspect of cybersecurity services.
More Details -
Blog, Learning CenterWhat is the Cost of Cyber Liability Insurance?
September 20, 2023The cost of cyber liability insurance can vary based on factors such as business size, industry, risk profile, and coverage needs.
More DetailsCyber Insurance, Tech Center -
WebinarCustomer Insights Webinar: Level Up Your Threat Intelligence Program
September 14, 2023More Details -
WebinarNavigating the Road to SEC Cyber Incident Disclosure Compliance
September 13, 2023More Details -
PressSecurityScorecard Joins Forces with Measured Analytics and Insurance to Deliver Industry-First Cyber Insurance Discounts for Top Security Ratings
September 13, 2023SecurityScorecard partners with Measured Analytics and Insurance to deliver the first cyber insurance premium incentive for Security Ratings.
More DetailsCyber Insurance -
BlogUsing a Standardized Approach for Measuring Cybersecurity in Government
September 12, 2023One of the highlights of last week's annual Billington CyberSecurity Summit was a fireside chat on Friday with Anne Neuberger, deputy national security adviser for cyber and emerging technology. In her talk, Neuberger stressed the importance of not only keeping our critical infrastructure secure but harnessing an accurate and repeatable way of measuring it to ensure progress.
More DetailsPublic Sector -
Ebook5 Steps You Can Take To Boost Your Boards Involvement And Stay Compliant
September 11, 2023PoshC2 is an open-source C2 framework used by penetration testers and threat actors. It can generate a Powershell-based implant, a C#.NET implant that we analyze in this paper, and a Python3 implant. The malware retrieves the current Windows user, the network domain name associated with the current user, the computer name, the processor architecture, the current process name and id, and the path of the Windows directory. The network communication is encrypted using the AES algorithm with a hard-coded key that can be changed by the C2 server. The C# implant can load and execute modules in memory without touching the disk by using multiple commands. It can perform post-exploitation activities by loading tools such as SharpHound, Rubeus, SharpView, and Seatbelt.
More DetailsVlad Pasca


