• The New Phishing Method That Bypasses MFA

    The New Phishing Method That Bypasses MFA

    Security experts, including our team at CYREBRO, tout the benefits of using multi-factor authentication (MFA) for an added layer of security. While that is still sound advice, recent research shows that a new phishing technique, which steals authentication cookies through Microsoft Edge WebView2 applications, can render MFA useless if people don’t take other precautions. Discovering…

  • Prisoners Dilemma – How Undisclosed Cyberattacks Put Us All at Risk 

    Prisoners Dilemma – How Undisclosed Cyberattacks Put Us All at Risk 

    According to the Wall Street Journal, an estimated 90 percent of cyber incidents at public companies went undisclosed in regulatory filings in 2018. That means that despite the habitual headlines we read concerning cyberattacks today, it’s only the tip of the iceberg. In fact, the practice of companies remaining quiet about such incidents has a…

  • Common Entry Points #3 – Unpatched & Obsolete Operating Systems

    Common Entry Points #3 – Unpatched & Obsolete Operating Systems

    Military strategy is about knowing where an opponent’s weak points are and how to take advantage of them. It is the same concept for cyberattacks. External threat actors don’t bide their time chipping away at strong defenses.  Instead, they exploit known vulnerabilities such as unpatched operating systems. A single unpatched OS can be the entry…

  • CYREBRO’s IR Analysis – Visibility Gaps and How to Eliminate Them

    CYREBRO’s IR Analysis – Visibility Gaps and How to Eliminate Them

    Today, the question isn’t if your company will suffer from a security incident, it’s when.  A few years ago, a shocking statistic came to light when CYREBRO analyzed internal incident response (IR) reports: 75% of reported security incidents were caused by inadequate investment in security solutions that caused blind spots in network visibility.  Unearthing that…

  • RansomWar in Costa Rica – Conti Ransomware Gang Attacks

    RansomWar in Costa Rica – Conti Ransomware Gang Attacks

    Conti, one of today’s most prolific and profitable ransomware groups, launched an initial cyberattack against Costa Rica in mid-April. In recent weeks, the Russian-speaking Conti gang, or possibly an associated group called Hive, have stepped up the attacks and expanded the assault. After Costa Rica refused to pay the initial $10 million ransom or the…

  • Common Entry Points #2 – VPN

    Common Entry Points #2 – VPN

    In our last Common Entry Points post, we discussed how ITaaS can be a major weak link, providing bad actors entry into an infrastructure. Another common but often overlooked entry point for attackers is a business’s virtual private network (VPN). Work from home and bring your own device (BYOD) policies have led to expanded attack…

Sign Up for Updates