IRISSCERT brings eminent cybersecurity experts to its conference in Dublin

The Irish Reporting and Information Security Service’s (IRISSCERT) Conference on Cybercrime will be on the 10th of November 2022 in the Aviva stadium. This all-day conference will focus on providing attendees with an overview of the current cyber threa… Continue reading IRISSCERT brings eminent cybersecurity experts to its conference in Dublin

Data visualization: An invaluable tool in a defender’s arsenal

Visibility is always a priority, but it’s vital when responding to an incident. Time is always working against incident responders. Looking through rows of text data and making connections between them and the suspicious activity under investigat… Continue reading Data visualization: An invaluable tool in a defender’s arsenal

Top outcomes organizations want from their security investments

Preventing data breaches and safeguarding remote workers are among the top security priorities and outcomes organizations want from their security investments, according to WithSecure. WithSecure polled over 3,000 IT decision makers, IT influencers, an… Continue reading Top outcomes organizations want from their security investments

Weakness in Microsoft Office 365 Message Encryption could expose email contents

WithSecure researchers are warning organizations of a security weakness in Microsoft Office 365 Message Encryption (OME) that could be exploited by attackers to obtain sensitive information. OME, which is used by organizations to send encrypted emails … Continue reading Weakness in Microsoft Office 365 Message Encryption could expose email contents

Thwarting attackers in their favorite new playground: Social media

For years, LinkedIn has been utilized by threat actors looking to refine their attacks. From simple spear-phishing attacks to reconnaissance, the professional networking site has provided a fertile field to harvest data and enhance criminal tactics, ev… Continue reading Thwarting attackers in their favorite new playground: Social media

Incident response in the cloud can be simple if you are prepared

If your business has moved toward off-premises computing, there’s a bonus to the flexibility and scalability services that AWS and Microsoft 365 can provide. Incident response (IR) in the cloud is far simpler than on-premises incident response. There i… Continue reading Incident response in the cloud can be simple if you are prepared

Introducing the book: If It’s Smart, It’s Vulnerable

All our devices and gadgets are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters… Continue reading Introducing the book: If It’s Smart, It’s Vulnerable

Targeted campaign uses infostealer to hijack Facebook Business accounts

WithSecure researchers have discovered an ongoing operation, dubbed “DUCKTAIL”, that targets individuals and organizations operating on Facebook’s Ads and Business platform. Based upon analysis and gathered data, the company has high … Continue reading Targeted campaign uses infostealer to hijack Facebook Business accounts

Detectree: Open-source tool simplifies data analysis for blue teams, reduces alert fatigue

Many companies struggle to understand malicious activity and its effects while a security incident is in progress. It eats up time and resources that defenders need to contain the attack and minimize damage. However, a new open-source tool built to inc… Continue reading Detectree: Open-source tool simplifies data analysis for blue teams, reduces alert fatigue