Attack
5 Ways MSPs Can Resolve a Hack
If you are a managed service provider (MSP) handling small and medium-sized businesses (SMB) clients, ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/6
Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing. ...
Cybersecurity Insights with Contrast CISO David Lindner | 9/29
Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password length trumps password complexity requirements. Now LastPass is forcing users into choosing ...
MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud
Last week, the BlackCat ransomware group (also known as ALPHV) attacked the operations of MGM Resorts and forced them to shut down their IT systems. What sets this attack apart from more ...
External Exposure Management: Key to Safeguarding Your Attack Surface
The number of security threats continues to grow rapidly with each passing year. Security teams work tirelessly to mitigate every alert labeled ‘high priority’—but there are too many, and it’s tough to ...
The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff
Popular password manager LastPass suffered a second attack that lasted for over two months. Now new and disturbing information is being released about the attack. Scott discusses the benefits and challenges of ...
Major Database Security Threats & How You Can Prevent Them
Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...
Graph-Fueled Defense-in-Depth Can Strengthen Security Posture
“GM Customer Accounts Hacked”, “Hacker Steals Database of Hundreds of Verizon Employees”, “Ransomware Attack Hits New Jersey County”. Another day, another breach, hack or ransomware attack. In fact, the average cost of a ...
Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser
A Cisco employee was compromised by a ransomware gang using a technique called multi-factor authentication fatigue, an attack on the Signal messenger app’s SMS service Twilio potentially disclosed the phone numbers of ...
Preventing CEO Impersonation Phishing Scams
Phishing scams are hardly a new concept. In fact, the first phishing attacks date back nearly 30 years to the mid-1990s. But despite the tactic’s age, it remains incredibly popular among cybercriminals ...