4 Stages of the Vulnerability Management Process

A vulnerability is a flaw or weakness in a system that, if exploited, would allow a user to gain unauthorized access to conduct an attack. Vulnerability management is the process of identifying, prioritizing, remediating, and reporting on vulnerabilities to proactively reduce your cyber risk. Because new vulnerabilities are constantly being introduced, vulnerability management is not…

Read More

Preventing Ransomware Attacks in a Hybrid Cloud Environment

Businesses interested in scaling up operations are turning to hybrid cloud environments as a cost-effective solution. Hybrid clouds provide the best of both worlds, allowing companies to expand their network without investing in additional, costly on-premises servers that must be maintained. While there are a number of benefits to a hybrid cloud environment, it is,…

Read More

Newly Discovered Chinese APT Operating Cyberespionage Campaign Against APAC Organizations Since 2013

Context On June 9, 2022, SentinelLabs disclosed technical details of a new Chinese-speaking cyberespionage group designated Aoqin Dragon. According to researchers at SentinelLabs, the group has been operating a cyberespionage campaign against government, education, and telecommunication organizations in Southeast Asia and Australia from at least 2013 to the present. SentinelLabs researchers also assessed with moderate…

Read More

Mitigate Compliance Risks with Cloud Security Posture Management (CSPM)

In a recent report, Gartner states that “through 2022, at least 95 percent of cloud security failures will be the customer’s fault.” So much for shared responsibility! The reality is that the public cloud providers are only responsible for the infrastructure required to host the cloud, while the consumer remains responsible for the data, applications,…

Read More

Federal Joint Advisory Warns of Chinese Threat Actors Targeting Telecommunications and Network Service Providers

Context On the evening of June 7, 2022, the United States National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) released a joint advisory detailing the tactics, techniques, and procedures (TTPs) used by unspecified Chinese state-backed threat actors to target unspecified telecommunication and network service organizations…

Read More

Risks and Benefits of Hybrid Cloud Architecture

According to Gartner, approximately 85% of organizations will be embracing a cloud-first principle by 2025. Transitioning workloads to the cloud has offered businesses the flexibility they need to scale up and down with fluctuating demand and provide reliable access to resources for both employees and customers worldwide, but this expanded attack surface, free of a…

Read More

Data Protection for Cloud Compliance

According to RH-ISAC’s 2021 CISO Benchmark Report, nearly 80% of CISOs anticipated a hybrid work environment in 2022. With the need for reliable access to company resources from any location, on any device, more and more companies are turning to the cloud for software-as-a-service offerings, as well as the infrastructure to host their data and…

Read More

Joint Federal Advisory on Karakurt Data Extortion Group Technical Details

Context On June 1, 2022, the United States Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigations (FBI), the Treasury Department, and the Financial Crimes Enforcement Network released a joint advisory with technical details and indicators of compromise for the Karakurt data extortion group. Karakurt is an advanced persistent threat (APT) group focused…

Read More

Microsoft Releases Mitigation Measures for Active MSDT Exploit

Context Microsoft has shared mitigation measures, which are included below, to block attacks exploiting the flaw, designated CVE-2022-30190, while a patch is being developed. Microsoft‘s entry for CVE-2022-30190 indicates it affects MSDT on all versions of Windows and Windows Server and has detected exploitation in the wild. The remote code execution vulnerability exists when Microsoft Support Diagnostic Tool (MSDT) is called using the…

Read More

Manage Your Cloud Vulnerabilities with an Identity and Access Management Strategy

Identity and access management (IAM) is a strategy for protecting critical information within your organization by limiting who is able to access privileged resources. With the rise of remote work and adoption of cloud-based work environments, identity can no longer be assumed based on location or device but must be verified by other authentication factors….

Read More