Threat Flash Alert: Threat Actors Actively Targeting Fortinet Vulnerabilities

Threat Flash Alert: Threat Actors Actively Targeting Fortinet Vulnerabilities 6 April 2021 Executive Summary The FBI recently released a joint cybersecurity advisory disclosing that several Advanced Persistent Threat (APT) groups are actively scanning devices for three FortiOS vulnerabilities. It is advised that anyone who has not already applied patches for these vulnerabilities to apply them […]

How Do You Know If You’ve Been Breached?

How Do You Know If You’ve Been Breached? How do you know if you’ve been breached?  That is one of the first five questions I ask when consulting a CISO or discussing Security On-Demand services with clients and customers.  It’s a simple but important question that is much harder to answer than you might expect, […]

What is Behavioral Analytics? And What are the Benefits?

What is Behavioral Analytics? And What are the Benefits of Using Behavioral Analytics in Cybersecurity? Behavioral Analytics is a term being tossed around the cybersecurity world in the last couple of years. So what is it? Well, traditionally, Behavioral Analytics are analytics that businesses use that focus on consumer trends, patterns, and activities.  Humans are […]

Why IP Blacklists are Inherently Unreliable

Blacklist of IP addresses

Why IP Blacklists are Inherently Unreliable Alerting based on IP reputation blacklists can have some value, but IP Blacklists are not a strong indicator of threats, despite what many claim.  IP reputation blacklists are notorious for their low quality, which makes alerts based on them less reliable and requires more analysis to verify that something […]

Threat Flash Alert: Four Microsoft Zero-Day Vulnerabilities Disclosed

Threat Flash Alert: Four Microsoft Zero-Day Vulnerabilities Disclosed Executive Summary Microsoft recently discovered evidence of an attack campaign currently in action which leverages several previously unknown vulnerabilities with on-premises Microsoft Exchange Servers. The vulnerabilities enable access to email accounts, and allow for installation of additional malicious entities to maintain persistence within a target’s environment in […]

Zero Access Trust-The Vulnerability of Trust

Zero Access Trust – The Vulnerability of Trust The year 2020 came to a close with the devastating SolarWinds Supply chain breach, affecting 18,000 of SolarWind’s customers. These attacks affected critical infrastructure, government entities and a wide range of private industry organizations. With the size and scale of this compromise the IT industry is seeing […]