What Online Gaming Cheats Teach Us About Cybersecurity

When you play a video game, you probably want to win, or at least show off real skill. Cheaters make it a lot less fun, according to a recent Irdeto Global Gaming Survey. It says 60% of all online video game players across the globe have had their gaming time negatively impacted by cheaters. These […]

The post What Online Gaming Cheats Teach Us About Cybersecurity appeared first on Security Intelligence.

Continue reading What Online Gaming Cheats Teach Us About Cybersecurity

CVE 2022-22965 (Spring4Shell) Vulnerability

On March 29, 2022, a security researcher with the handle p1n93r disclosed a Spring Framework remote code execution (RCE) vulnerability, which was archived by vx-underground. This vulnerability, known as Spring4Shell, affects applications that use JDK v9 or above that run Apache Tomcat as the Servlet Container in a WAR package and use dependencies of the…

The post CVE 2022-22965 (Spring4Shell) Vulnerability appeared first on TrustedSec.

Continue reading CVE 2022-22965 (Spring4Shell) Vulnerability

Simplifying Your Operational Threat Hunt Planning

Opening Hopefully you all were able to read our recent Threat Hunting whitepaper and had the chance to listen to our latest Threat Hunting webinar. These references should be used as the foundation of information, which leads us into the next journey: how to build out your first Threat Hunt. Building out an organization’s Threat…

The post Simplifying Your Operational Threat Hunt Planning appeared first on TrustedSec.

Continue reading Simplifying Your Operational Threat Hunt Planning

TrustedSec Okta Breach Recommendations

TrustedSec’s Incident Response Team sent urgent communications to all IR retainer clients after the discovery of the compromise of Okta. Below are the recommendations provided with additional updates after reviewing more information on 03/23/2022. On March 22, 2022, the threat group LAPSUS$ announced a successful compromise of Okta, a heavily used identity and access management…

The post TrustedSec Okta Breach Recommendations appeared first on TrustedSec.

Continue reading TrustedSec Okta Breach Recommendations

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene

Every day, new challenges, attacks, and vulnerabilities are publicized. Just as attackers and the threat landscape are constantly changing, adapting, and evolving, so too must the Blue Teams and defenders who protect organizations against these threats. While the old adage may have been that attacks are rare and unlikely to happen, a new mentality of…

The post Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene appeared first on TrustedSec.

Continue reading Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene

Expert Insights: What’s Next for Ransomware?

Last year, many organizations stopped talking about when the workforce would be back full-time in the office. Instead, they focused on how we build a hybrid work model for the future. 2021 was active and interesting – for lack of a better word. There’s a lot to say in terms of cyber crime in general […]

The post Expert Insights: What’s Next for Ransomware? appeared first on Security Intelligence.

Continue reading Expert Insights: What’s Next for Ransomware?

Are separate SIEMs for threat hunting a good idea?

In this interview with Help Net Security, Brian Dye, CEO at Corelight, talks about the trend of creating separate SIEMs for threat hunting and why this is not achieveable for all organizations. We are seeing companies establishing separate SIEMs for th… Continue reading Are separate SIEMs for threat hunting a good idea?

TrickBot Bolsters Layered Defenses to Prevent Injection Research

This post was written with contributions from IBM X-Force’s Limor Kessem and Charlotte Hammond. The cyber crime gang that operates the TrickBot Trojan, as well as other malware and ransomware attacks, has been escalating activity. As part of that escalation, malware injections have been fitted with added protection to keep researchers out and get through […]

The post TrickBot Bolsters Layered Defenses to Prevent Injection Research appeared first on Security Intelligence.

Continue reading TrickBot Bolsters Layered Defenses to Prevent Injection Research

Insider Threats: How to Combat Workplace Disinformation

Who hasn’t heard about disinformation or fake news? And for those responsible for security, who hasn’t heard about the risk of insider threats? Both issues are well known, but how disinformation can affect cyber risk management might not be so obvious.  This article won’t tell you who’s right or wrong in a political debate. Instead, […]

The post Insider Threats: How to Combat Workplace Disinformation appeared first on Security Intelligence.

Continue reading Insider Threats: How to Combat Workplace Disinformation

What It Takes to Build the Blue Team of Tomorrow

A good defense takes some testing. Ethical hacking involves pitting two teams together for the sake of strengthening digital security defenses. The red team attempts to bypass digital security barriers. By doing so, they reveal both misconceptions and flaws in their employer’s attack detection. Then, the blue team tries to defend against the red team’s […]

The post What It Takes to Build the Blue Team of Tomorrow appeared first on Security Intelligence.

Continue reading What It Takes to Build the Blue Team of Tomorrow