• Decrypting Dollars – Understanding the $10.5T Threat

    Decrypting Dollars – Understanding the $10.5T Threat

    In 2020, Cybersecurity Ventures published a significant statistic: cybercrime was forecasted to cost the world $10.5 trillion annually by 2025. This figure represented the predicted market value of cybercrime and served as an alarming indication of the escalating growth and scale of attacks to come. It sent a wave of panic through the business world and set…

  • Alert Overload: False Positives’ Hidden Costs in Cybersecurity 

    Alert Overload: False Positives’ Hidden Costs in Cybersecurity 

    Let’s say you just bought a new house. Even though it’s in a gated neighborhood with security guards, you don’t want to risk anything, so you install a state-of-the-art security system. Every day, you get a flurry of alerts on your phone, triggered by your family coming and going through the front door, opening a…

  • Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    In the realm of cybersecurity, threat attribution is akin to the investigative methods of the legendary detective Sherlock Holmes. Just as Holmes used his acute observation skills and deductive reasoning to pinpoint the perpetrator in a mystery, threat attribution involves meticulously analyzing cyberattacks to trace their origins and identify the attackers. In his classic form,…

  • Detecting Lateral Movement – Decoding Cyber Threats with MITRE ATT&CK and Proactive Monitoring

    Detecting Lateral Movement – Decoding Cyber Threats with MITRE ATT&CK and Proactive Monitoring

    23andMe is a personal genomics and biotechnology company based in Sunnyvale, California, and is known for its direct-to-consumer genetic testing kits. According to a blog post posted on its website on October 6, 2023, the company acknowledged falling victim to a credential-stuffing attack on its website. This cyberattack involved using stolen login credentials to enable…

  • DFIR To the Rescue – The Cybersecurity Joker 

    DFIR To the Rescue – The Cybersecurity Joker 

    Picture this: A person arrives at the office Monday morning, and panic sets in when he logs onto the company network. His screen displays an ominous message explaining the company’s files have been stolen and encrypted, and the company has 48 hours to make contact and pay a ransom or lose access forever. The man…

  • GhostLocker RaaS Operations Growing as Recruiters Search for Cash Flow

    GhostLocker RaaS Operations Growing as Recruiters Search for Cash Flow

    Remember when hacktivism felt like a rebellious punk rock anthem raging against the affluent corporate machine? Hacktivists flitted through cyberspace as digital Robin Hoods fueled by righteous indignation or online warriors with a penchant for mischief. Those days are about as ancient as dial-up internet. Today, the cybercrime scene is a cutthroat business. A new…

Sign Up for Updates