Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

A Detailed Analysis of the RedLine Stealer

January 22, 2024

A Detailed Analysis of the RedLine Stealer
Executive Summary: What is Redline Stealer? RedLine is a stealer distributed as cracked games, applications, and services. The malware steals information from web browsers, cryptocurrency wallets, and applications such as FileZilla, Discord, Steam, Telegram, and VPN clients. The binary also gathers data about the infected machine, such as the… Read More
STRIKE Team
Microsoft ProxyNotShell Zero Days

January 22, 2024

Microsoft ProxyNotShell Zero Days
Executive Summary Researchers publicly disclosed two new Microsoft Exchange zero-day vulnerabilities, now tracked as CVE-2022-41040 and CVE-2022-41082, on September 29, with Microsoft subsequently confirming that they were under active exploitation. In less than twenty-four hours after their first publication, SecurityScorecard developed an emergency informational signal to give customers visibility into… Read More
A Detailed Analysis Of A New Stealer Called Stealerium

January 15, 2024

A Detailed Analysis Of A New Stealer Called Stealerium
Close Encounters in the Healthcare Sector

January 15, 2024

Close Encounters in the Healthcare Sector
Healthcare
Close Encounters in the Insurance Sector

January 15, 2024

Close Encounters in the Insurance Sector
Cyber Insurance
The CISO’s Playbook: Stay Ahead of Friday Breach Effects

January 14, 2024

The CISO’s Playbook: Stay Ahead of Friday Breach Effects
Proactive Security Measures for Global Maritime Shipping

January 14, 2024

Proactive Security Measures for Global Maritime Shipping
A Deep Dive into Avos Locker Ransomware

January 14, 2024

A Deep Dive into Avos Locker Ransomware
Managing Third-Party Risk In The Era Of Zero Trust

January 14, 2024

Managing Third-Party Risk In The Era Of Zero Trust
Attack Surface Management
Cyber Threat Intelligence
Supply Chain Cyber Risk
Cybersecurity and Executive (dis)Orders: Cognitive and Systemic Risk in the Boardroom

January 14, 2024

Cybersecurity and Executive (dis)Orders: Cognitive and Systemic Risk in the Boardroom
Close Encounters in the Public Sector

January 14, 2024

Close Encounters in the Public Sector
Public Sector
Cyber Risk Intelligence: Iran-Linked Attack on U.S. Water Treatment Facility

January 12, 2024

Cyber Risk Intelligence: Iran-Linked Attack on U.S. Water Treatment Facility
Public Sector
Cyber Risk Intelligence: Idaho National Laboratory Data Breach

January 12, 2024

Cyber Risk Intelligence: Idaho National Laboratory Data Breach
Public Sector
Japan’s Nikkei 225 Index: The State of Cybersecurity in Japan

January 12, 2024

Japan’s Nikkei 225 Index: The State of Cybersecurity in Japan
Cyber Threat Intelligence
Security Ratings
North Korean State-Sponsored Cyber Attack: Unveiling the Intricacies of Threat Actor Group Andariel

January 12, 2024

North Korean State-Sponsored Cyber Attack: Unveiling the Intricacies of Threat Actor Group Andariel
Cyber Threat Intelligence
Energy Sector Cybersecurity Report: Navigating Third-Party Cyber Risk

January 12, 2024

Energy Sector Cybersecurity Report: Navigating Third-Party Cyber Risk
Cyber Threat Intelligence
Cyber Conflict And The Erosion Of Trust: Introducing the Cyber Resilience Scorecard

January 12, 2024

Cyber Conflict And The Erosion Of Trust: Introducing the Cyber Resilience Scorecard
Cyber Threat Intelligence
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days

January 12, 2024

Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
Cyber Threat Intelligence
Log4j Security Vulnerability

January 12, 2024

Log4j Security Vulnerability
Cyber Threat Intelligence
SecurityScorecard Validation Assessment Summary

January 12, 2024

SecurityScorecard Validation Assessment Summary
Android Malware on the Rise – A case study of AhMyth RAT

January 12, 2024

Android Malware on the Rise – A case study of AhMyth RAT