Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
January 22, 2024
A Detailed Analysis of the RedLine Stealer
Executive Summary: What is Redline Stealer? RedLine is a stealer distributed as cracked games, applications, and services. The malware steals information from web browsers, cryptocurrency wallets, and applications such as FileZilla, Discord, Steam, Telegram, and VPN clients. The binary also gathers data about the infected machine, such as the… Read More
STRIKE Team
January 22, 2024
Microsoft ProxyNotShell Zero Days
Executive Summary Researchers publicly disclosed two new Microsoft Exchange zero-day vulnerabilities, now tracked as CVE-2022-41040 and CVE-2022-41082, on September 29, with Microsoft subsequently confirming that they were under active exploitation. In less than twenty-four hours after their first publication, SecurityScorecard developed an emergency informational signal to give customers visibility into… Read More
January 15, 2024
A Detailed Analysis Of A New Stealer Called Stealerium
January 15, 2024
Close Encounters in the Healthcare Sector
Healthcare
January 15, 2024
Close Encounters in the Insurance Sector
Cyber Insurance
January 14, 2024
The CISO’s Playbook: Stay Ahead of Friday Breach Effects
January 14, 2024
Proactive Security Measures for Global Maritime Shipping
January 14, 2024
A Deep Dive into Avos Locker Ransomware
January 14, 2024
Managing Third-Party Risk In The Era Of Zero Trust
Attack Surface Management
Cyber Threat Intelligence
Supply Chain Cyber Risk
January 14, 2024
Cybersecurity and Executive (dis)Orders: Cognitive and Systemic Risk in the Boardroom
January 14, 2024
Close Encounters in the Public Sector
Public Sector
January 12, 2024
Cyber Risk Intelligence: Iran-Linked Attack on U.S. Water Treatment Facility
Public Sector
January 12, 2024
Cyber Risk Intelligence: Idaho National Laboratory Data Breach
Public Sector
January 12, 2024
Japan’s Nikkei 225 Index: The State of Cybersecurity in Japan
Cyber Threat Intelligence
Security Ratings
January 12, 2024
North Korean State-Sponsored Cyber Attack: Unveiling the Intricacies of Threat Actor Group Andariel
Cyber Threat Intelligence
January 12, 2024
Energy Sector Cybersecurity Report: Navigating Third-Party Cyber Risk
Cyber Threat Intelligence
January 12, 2024
Cyber Conflict And The Erosion Of Trust: Introducing the Cyber Resilience Scorecard
Cyber Threat Intelligence
January 12, 2024
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
Cyber Threat Intelligence
January 12, 2024
Log4j Security Vulnerability
Cyber Threat Intelligence
January 12, 2024
SecurityScorecard Validation Assessment Summary
January 12, 2024
Android Malware on the Rise – A case study of AhMyth RAT