LogicHub Security RoundUp: July 2022

LogicHub Security RoundUp: July 2022

Hello, and welcome to the latest edition of the LogicHub Monthly Update! Each month we’ll be covering a broad view of this past month’s threats, a series of informative use cases seen this month by our teams, and a series of recommended articles, podcasts, and other useful resources. Watch the ... Read More
LogicHub Security RoundUp: June 2022

LogicHub Security RoundUp: June 2022

Hello, and welcome to the latest edition of the LogicHub Monthly Update! Each month we’ll be covering a broad view of this past month’s threats, a series of informative use cases seen this month by our teams, and a series of recommended articles, podcasts, and other useful resources. Watch the ... Read More
Follina Zero-Day Vulnerability Breakdown: Analysis and Remediation

Follina Zero-Day Vulnerability Breakdown: Analysis and Remediation

Background The newest Microsoft Office zero-day vulnerability, Follina, has been causing a buzz around much of the security community. The largest differences between it and most other Office vulnerabilities are that it has found a way around the use of macros and that it does not have any planned patches ... Read More
LogicHub Security Roundup: May 2022

LogicHub Security Roundup: May 2022

Hello, and welcome to the latest edition of the LogicHub Monthly Update! Each month we’ll be covering a broad view of this past month’s threats, a series of informative use cases seen this month by our teams, and a series of recommended articles, podcasts, and other useful resources. Watch the ... Read More
Bad Luck: BlackCat Ransomware Bulletin

Bad Luck: BlackCat Ransomware Bulletin

Blackcat Ransomware On April 19th of 2022, the FBI Cyber Division released a flash bulletin regarding the Blackcat ransomware-for-hire. This was met with mixed reactions - some found the ransomware to be of little concern, others made a case for tracking its progress. Either way, this ransomware-for-hire has been around ... Read More
Integrating Better: What Can Integrations Do For Me?

Integrating Better: What Can Integrations Do For Me?

Introduction Within the realm of security, there are many different toolsets and opinions on what works and what doesn’t. There are an equal number of variables: from industry standards to data sources, each network is very different and requires careful configuration to achieve the maximum value from a security setup ... Read More
LogicHub Security Roundup: April 2022

LogicHub Security Roundup: April 2022

Hello, and welcome to the latest edition of the LogicHub Monthly Update! Each month we’ll be covering a broad view of this past month’s threats, a series of informative use cases seen this month by our teams, and a series of recommended articles, podcasts, and other useful resources. Watch the ... Read More
Under the Wire: Evading Censorship & Protecting Sensitive Information

Under the Wire: Evading Censorship & Protecting Sensitive Information

Troubled Times In times of trouble, citizens can feel a sense of deep helplessness. With war, famine, or political unrest raging outside of their window, many feel compelled to help or somehow make a difference, but may not understand how their position is valued.The organization Reporters Without Borders is a ... Read More
Weathering Russian Winter: The Current State of Russian APTs

Weathering Russian Winter: The Current State of Russian APTs

Russian Advanced Persistent Threats (APTs) It’s no secret that Russian Advanced Persistent Threats (APTs) are a significant burden on cybersecurity teams. For years, organizations have been bombarding their systems with patches and configuration changes to dodge targeted attacks, and the focus on APTs specifically from Russia has never been higher ... Read More
Drawing the RedLine - Insider Threats in Cybersecurity

Drawing the RedLine – Insider Threats in Cybersecurity

RedLine Password Theft Malware The RedLine password theft malware is a hot topic this month with Microsoft’s employee compromise. Though Microsoft didn’t offer many officially released details on what occurred, we can examine how RedLine works to gain an understanding of what may have possibly occurred. Passwords: An Easy Target ... Read More