New Mimic Ransomware Abuses Everything Paid to Speed Encryption

Context On January 26, 2023, Trend Micro researchers reported the technical details of a new ransomware they dubbed “Mimic” they observed in June of 2022 targeting English and Russian-speaking users. Technical Details According to Trend Micro researchers, the campaign delivers an executable that drops multiple binaries and an archive containing the payload. Reportedly, the key…

Read More

A Roadmap to Zero-Trust Maturity

Despite all the marketing hype related to ZTA, at the end of the day, it may not make sense for all organizations, particularly those in less risky environments to implement or pursue all components. That said, all organizations can learn from the tenets and leverage them to improve their security posture. In the preceding series,…

Read More

Cybersecurity Budgets Increase for Retail & Hospitality Industry

Vienna, VA (January 25, 2023) – Information security teams have always had to do more with less, but 2023 might be the year when they are able to do more with more. Riding a three-year trend, 70% of CISOs expect their budgets to increase again this year, while 60% also expect more FTEs, according to…

Read More

Alleged Chinese Threat Actors Developing Fortinet Zero-Day Exploit for New “BOLDMOVE” Malware Campaign Targeting European and African Organizations

Context On January 19, 2023, Mandiant security researchers published the technical details of malware campaign preparations they’ve reportedly observed since October 2022. Two key points should be noted regarding Mandiant’s assessment: Mandiant has not directly observed exploitation of the vulnerability, or deployment of BOLDMOVE in the wild. Mandiant researchers assess with low confidence that the…

Read More

Member Spotlight: Leah Schwartzman

This month’s member spotlight is Leah Schwartzman, Lead Cybersecurity Analyst, CTI at Target. We asked Leah to tell us more about her experiences as a member of the cybersecurity and RH-ISAC communities. How did you end up in the cybersecurity field? Leah: With the shift in consumer behavior and shopping patterns, the line is blurred between…

Read More