The Road to Ransomware Resilience: Behaviour Analysis
Understanding Active and Emerging Threats & Developing a More Effective Novel Response
The Road to Ransomware Resilience: The State of Ransomware
Understanding Active and Emerging Threats & Developing a More Effective Novel Response
What Is Compromise Assessment
The Benefits, How it’s Different, How to Choose a Vendor, and More.
Central Group’s Centara Luxury Hotel Chain Breached by Desorden
DESORDEN hacking group is claiming responsibility for the hack of Centara Hotels, a major hotel chain.
LockBit2.0, Beyond Privacy and Security
Lockbit2.0, beyond privacy and security This document describes the recent Cyber Attacks on Accenture that reportedly affected over 2,500 computers and leaked client information. LockBit threat actors posted the names of companies and their logos on their dark web site. They threatened to publish the data stolen during the Accenture ransomware attack. The threat actor […]
2021 Cybersecurity Company Awards
CyCraft Technology Wins Multiple 2021 Cybersecurity Excellence Awards CyCraft Technology, the fastest growing Cybersecurity firm in Asia, is excited to announce that the 2021 Cybersecurity Excellence Awards has recognized their security operations (SecOps) platform CyCraft AIR as a gold winner in multiple categories, including: Gold Winner – Advanced Persistent Threat (APT) Protection Gold Winner – […]
Conti Ransomware, Best Practices to Protect Your System
How enterprises today should approach best practices to protect against Conti ransomware & others, from case study to recovery.
Managed Detection and Response Vendor Evaluation
There are multiple avenues open to you to evaluate MDR vendors—each with its own advantages and shortcomings. Here are a few places to get started.
Is Your Supply Chain Under Attack?
When a threat actor compromises your system through an outside partner with access to your systems and data, this is what we call a supply chain attack. We have observed that attacks on supply chains have increased in numbers (66%) and sophistication, based on 2021 research. Organizations with string security protection alone are no longer sufficiently insulated to mitigate attacks on the Supply Chain. Due to massive security breaches at busines service providers like Solarwinds, Microsoft, BlackBaud and Accellion, many organizations have fallen victim to these cyber-attacks. This highlights third-party vendor and supply chain cybersecurity risk.
What is Managed Detection and Response?
Managed Detection and Response (MDR) is a cybersecurity service that includes threat intel, monitoring, analysis, and fast response.