Threat Alerts
Cybersecurity Services combat an APT with NDR
Attackers linked to Iran and China are actively targeting critical infrastructure. Both the U.S. Environmental Protection Agency and National Security Agency have requested that each…
Launch extended detection and response steps to manage Log4j vulnerability
Threat Hunts must include cloud, network, endpoint, log and email vectors Note: OpenText™ Security reports that there is no Log4j impact on its EnCase suite…
Kaseya VSA Zero-Day Supply Chain Ransomware Attack
Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July 2, 2021. A compromised Kaseya…
JBS Ransomware attack highlights need for early detection and rapid response
Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these attacks was against JBS, the…
Threat alerts
December 2021 December 14, 2021: Log4j Summary: Top US cybersecurity officials have warned of the zero-day vulnerability found in the Java logging library Apache Log4j….
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…
Addressing cyber resilience gaps across key infrastructure assets
The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past…
Lessons from the SolarWinds attack: How to protect your business
By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated at least 18,000 government agencies,…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.