CYREBRO Blog

Guarding Against MFA Fatigue with 24×7 Monitoring

Leveraging fatigue as a means of persuasion is a potent technique. Even young children pick up on this, persistently requesting treats until a weary parent finally gives in, seeking a brief respite. But children aren’t the only ones employing this tactic. How often have we made a purchase simply to deter a persistent salesperson? MFA…

  • Why the Financial Sector Is Especially Vulnerable to the Insider Sabotage Threat 

    Why the Financial Sector Is Especially Vulnerable to the Insider Sabotage Threat 

    In the 2008 crime comedy movie Mad Money, three women with menial jobs at the Federal Reserve Bank of Kansas City plot to steal money from the branch. Each works in a different department, but by leveraging their work responsibilities and unique access to areas of the building, they’re able to pull off their theft…

  • Guarding Against MFA Fatigue with 24×7 Monitoring

    Guarding Against MFA Fatigue with 24×7 Monitoring

    Leveraging fatigue as a means of persuasion is a potent technique. Even young children pick up on this, persistently requesting treats until a weary parent finally gives in, seeking a brief respite. But children aren’t the only ones employing this tactic. How often have we made a purchase simply to deter a persistent salesperson? MFA…

  • Pre and Post Breach Insights From the MOVEit Incident – Strengthening Cyber Posture

    Pre and Post Breach Insights From the MOVEit Incident – Strengthening Cyber Posture

    In 1972, Edward Norton Lorenz, a mathematician and meteorologist, introduced the world to the Butterfly Effect, giving birth to the science of chaos theory. The “Butterfly Effect” rests on the notion that the world is so interconnected today, that a one-time small occurrence can have a major impact on a larger more complex system. He…

  • Living-off-the-Land: How Attackers Blend into Traffic

    Living-off-the-Land: How Attackers Blend into Traffic

    “Living off the land” is a strategy employed to discreetly achieve a dubious aim. Think about a couple of wedding crashers. Dressed impeccably, they blend in seamlessly with legitimate guests, indulging in the spread and avoiding direct contact with the newlyweds who might identify them as illegitimate guests. Similarly, a hiker in the wilderness becomes…

  • Tackling Ransomware’s Grip on Education

    Tackling Ransomware’s Grip on Education

    Educational institutions are facing a crisis. Over a short period of time, K-12 schools and universities became heavily reliant on technology. From online classes to managing student records, digitization is being embraced to enhance learning experiences and increase administrative efficiency. However, digital transformation comes at a cost – exposing these organizations to cyber threats. From an…

  • Cobalt Strike – From Tool to Trap – When Malice Wields the Weapon

    Cobalt Strike – From Tool to Trap – When Malice Wields the Weapon

    It is a classic movie theme: a weapon of great power or mass destruction falls into the wrong hands. Many a James Bond film has used that script and it has proved to be a winning one. Unfortunately, it has also become a common script when it comes to cybersecurity in which hackers and financially…

Loading

Sign Up for Updates