The United States sent its top cyber offensive team to NATO ally Albania to help secure the nation's critical infrastructure networks. The Cyber National Mission Force helped find cyberthreats and vulnerabilities on networks likely targeted last year by Iranian threat actors.
Russia's invasion of Ukraine in 2022 threw Russia's cybercrime ecosystem into a state of upheaval that still exists to this day. "We identified disruptions to literally every single form of commodified cybercrime," said Alexander Leslie, associate threat intelligence analyst at Recorded Future.
Last year was another bonanza in zero-days for Chinese state hackers, say security researchers in a report predicting a permanent uptick in nation-state exploitation of yet-unpatched vulnerabilities. "Attackers seek stealth and ease of exploitation," writes cybersecurity firm Mandiant.
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
With many security professionals and vendors focusing on security tools and SOC activities, it is easy to overlook the broader scope of an organization’s cyber security mission. Download Mandiant’s award-winning book to learn the six critical functions of cyber defense and how to mature and optimize your cyber...
The Defender’s Advantage Cyber Snapshot was developed with one overarching goal: to provide insights into cyber defense topics of growing importance based on frontline observations and real-world experiences. This issue covers a wide range of topics, from threat analysis to cyber defense best practices.
The Defender’s Advantage Cyber Snapshot report offers insights into cyber defense topics of growing importance based on frontline observations and real-world experiences.
Download this report to learn:
The journey to passwordless authentication
Minimizing risk to obtain cyber insurance
Activating cyber defense...
Security teams are concerned that senior leaders don’t fully grasp the nature of cyber threats. This means that critical cyber security decisions are being made without insights into the adversary and their tactics.
Download Mandiant’s global survey findings to learn:
Insights into how organizations are...
Cybersecurity researchers say they are almost certain they have spotted traces of the advanced persistent threat group Dark Pink, which recently emerged, now apparently attacking victims with a newly improved obfuscation routine to evade anti-malware measures.
Arctic Wolf has expanded its security operations platform into threat intelligence, incident response and cyber insurance, says CEO Nick Schneider. The company has focused on putting businesses in the best possible position to answer questions from insurance carriers following a security incident.
The Royal ransomware group targeting critical infrastructure in the United States and other countries is made up of experienced ransomware attackers and has strong similarities to Conti, the infamous Russia-linked hacking group, according to a new alert issued by U.S. authorities.
Threat actors actively targeting multinational clients of data center outsourcers and help desk providers in China and Singapore are posting stolen credentials for sale on data leak sites, and cybersecurity firm Resecurity says these actions could be part of a nation-state cyberespionage campaign.
The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Adversaries in critical infrastructure networks have illustrated knowledge of control system components, industrial protocols, and engineering operations. From...
No matter what aspect of cyber security you’re delivering, it takes both time and resources to properly plan, implement, tune, and manage an effective program. The MITRE ATT&CK framework is one of the fastest growing methodologies for structuring a cyber security program.
This white paper discusses the MITRE...
The Asia-Pacific region had the dubious distinction of being the global region that faced the most cyberattacks during 2022, as observed by IBM's threat intelligence platform. IBM says the region accounted for 31% of all incidents monitored during 2022.