How to Defend Against Extortion Groups Like Lapsus$

The hacker group Lapsus$ (sometimes referred to as LAPSUS$ or simply Lapsus) is a relatively newer organization in the cyber arena. The group began to garner public attention in December 2021 after some successful attacks on major corporations, where even the Department of Homeland Security felt it necessary to spend more time researching this group […]

The post How to Defend Against Extortion Groups Like Lapsus$ appeared first on Security Intelligence.

Continue reading How to Defend Against Extortion Groups Like Lapsus$

A flaw in ConnectWise Control spurred the company to make life harder for scammers

A vulnerability in popular remote access service/platform ConnectWise Control could have been leveraged by scammers to make compromising targets’ computers easier, Guardio researchers have discovered. By abusing the fully-featured 14-day trial op… Continue reading A flaw in ConnectWise Control spurred the company to make life harder for scammers

Fake subscription invoices lead to corporate data theft and extortion

A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software to steal sensitive data and extort money from small and medium-size businesses. The group is eschewing the use of ransomware and instead relies on targeted e… Continue reading Fake subscription invoices lead to corporate data theft and extortion

Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale

As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add authentication for millions of third parties and non-employees, and thousands of applications and IoT devices to the mix and you start to understand how important identity and access management (IAM) is.  What Exactly […]

The post Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale appeared first on Security Intelligence.

Continue reading Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale

Remote Work Makes it More Important Than Ever to Trust Zero Trust

The remote work era makes the zero trust model critical for most businesses. The time has come to use it. But first, let’s understand what it really is and why the hybrid and remote work trend makes it all but mandatory.  What Is Zero Trust? Zero trust is not a product or a service, but […]

The post Remote Work Makes it More Important Than Ever to Trust Zero Trust appeared first on Security Intelligence.

Continue reading Remote Work Makes it More Important Than Ever to Trust Zero Trust

Starting at Home: Cybersecurity in the Hybrid Workplace

As people settle into the late stages of the pandemic, the hybrid workplace is not going anywhere. Therefore, the enterprise must address the increasing number of entry points into the network as more employees work remotely.  In 2021, 61% of malware directed at organizations targeted remote employees via cloud apps. Since the onset of the pandemic, […]

The post Starting at Home: Cybersecurity in the Hybrid Workplace appeared first on Security Intelligence.

Continue reading Starting at Home: Cybersecurity in the Hybrid Workplace

Organizations taking nearly two months to remediate critical risk vulnerabilities

Edgescan announces the findings of a report which offers a comprehensive view of the state of vulnerability management globally. This year’s report takes a more granular look at the trends by industry, and provides details on which of the known, … Continue reading Organizations taking nearly two months to remediate critical risk vulnerabilities