Risks and Benefits of Hybrid Cloud Architecture

According to Gartner, approximately 85% of organizations will be embracing a cloud-first principle by 2025. Transitioning workloads to the cloud has offered businesses the flexibility they need to scale up and down with fluctuating demand and provide reliable access to resources for both employees and customers worldwide, but this expanded attack surface, free of a…

Read More

Data Protection for Cloud Compliance

According to RH-ISAC’s 2021 CISO Benchmark Report, nearly 80% of CISOs anticipated a hybrid work environment in 2022. With the need for reliable access to company resources from any location, on any device, more and more companies are turning to the cloud for software-as-a-service offerings, as well as the infrastructure to host their data and…

Read More

Joint Federal Advisory on Karakurt Data Extortion Group Technical Details

Context On June 1, 2022, the United States Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigations (FBI), the Treasury Department, and the Financial Crimes Enforcement Network released a joint advisory with technical details and indicators of compromise for the Karakurt data extortion group. Karakurt is an advanced persistent threat (APT) group focused…

Read More

Microsoft Releases Mitigation Measures for Active MSDT Exploit

Context Microsoft has shared mitigation measures, which are included below, to block attacks exploiting the flaw, designated CVE-2022-30190, while a patch is being developed. Microsoft‘s entry for CVE-2022-30190 indicates it affects MSDT on all versions of Windows and Windows Server and has detected exploitation in the wild. The remote code execution vulnerability exists when Microsoft Support Diagnostic Tool (MSDT) is called using the…

Read More

Manage Your Cloud Vulnerabilities with an Identity and Access Management Strategy

Identity and access management (IAM) is a strategy for protecting critical information within your organization by limiting who is able to access privileged resources. With the rise of remote work and adoption of cloud-based work environments, identity can no longer be assumed based on location or device but must be verified by other authentication factors….

Read More

International Airline Service Interruptions

Context On May 25, 2022, multiple flights in India were grounded for several hours after the airline confirmed a ransomware attack on their internal systems that also disrupted their website functionality. On May 26, 2022, a small airline cancelled all flights leaving Gatwick in the United Kingdom from 1 to 3 p.m. BST due to…

Read More

Zero Trust Architecture for Cloud Vulnerability Management

A zero-trust approach to security, as the name implies, means that no user or application is inherently trusted. All access must be verified before permission is granted. A zero-trust approach relies on the principle of least privilege and microsegmentation of resources to limit access to just what is needed for the work being done. Behavior…

Read More

Cloud Compliance Standards and Security Frameworks

The cloud provides increased flexibility for businesses in today’s digital world, but the transition to cloud services has changed the nature of security. Old rules based on trusted on-premises perimeters are no longer relevant, and security teams must apply new standards to ensure compliance with data regulations and security best practices. This is where cloud…

Read More

Conti Ransomware Shuts Down Operation, Splinters into Smaller Groups

Summary The notable ransomware gang known as Conti has, according to security firm Advanced Intel (AdvIntel), taken its infrastructure offline and shut down its ransomware operations. While public-facing ‘Conti News’ data leak and the ransom negotiation sites are still online, the Tor admin panels used by Conti members to perform negotiations, publish news, and generate…

Read More

Technical Details on CrateDepression Rust Supply-Chain Attack Campaign

Context On May 19, 2022, security researchers at Sentinel Labs released technical details of a campaign targeting the Rust development community with a supply-chain attack by leveraging a malicious crate. The Rust Security Response Working Group released an advisory regarding the malicious crate on May 10, 2022. The malicious crate was named “rustdecimal,” likely intended…

Read More