COVID-19 Phishing Campaigns

The cyberthreats following in the wake of the COVID-19 pandemic are not substantively different from the threats that security professionals have dealt with during other national or global calamities like the Indian Ocean tsunami, Amazon fires, floods, and hurricanes. Sophisticated cybercriminal, state-sponsored threat actors, and hacktivists have always taken advantage of widespread anxieties in times…

Read More

Top 5 Tips to Protect User Data

If there’s one thing that never changes in cybersecurity, it’s this: threat actors will always look for the path of least resistance to gain access to a victim’s network. While companies that collect and maintain personally identifiable information (PII) or protected health information (PHI) are often the preferred targets of threat actors, attackers will target…

Read More

6 Best Practices for Data Breach Protection

Keeping your data safe and protected often seems like an uphill battle. Consistently presenting a hardened attack surface to a would-be attacker and doing so across all the various attack vectors possible is a difficult problem to solve. The attacker only has to be right once, while you and your broader security team have to…

Read More

RH-ISAC Holiday Tips Featured on Dark Reading

Recently, RH-ISAC’s Director of Intelligence Operations Muktar Kelati spoke with Dark Reading about how retailers can protect themselves from hackers and scammers seeking to put a damper on both holiday spirits and sales. While retail and hospitality organizations are already working on rolling out sales, deals and other holiday promotions, threat actors are also making their lists…

Read More