Executive Summary: Conti Opens a New Front in the Fight for Firmware

Executive Summary: Conti Opens a New Front in the Fight for Firmware

| | Industry
Recently leaked communications from within the notorious Conti ransomware group have exposed a new strategy to exploit firmware and gain complete control over a system ...
Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms

Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms

Synopsis The Exfiltration Phase of The Kill Chain of a Cryptocurrency-Based Attack Provides the Greatest Opportunity to Identify Cybercriminals Cryptocurrency gained through illicit means is less useable than other assets due to ...

QCT & Pantsdown: An Executive Summary

| | Industry
Recent research has identified that a number of Quanta Cloud Technology (QCT) servers are vulnerable to the well-known ‘Pantsdown’ vulnerability. This post explores the business ramifications of this issue.   ...
Active Exploitation of F5 BIG-IP Devices (CVE-2022-1388)

Active Exploitation of F5 BIG-IP Devices (CVE-2022-1388)

| | Industry, research
The Eclypsium research team has detected in-the-wild exploitation of CVE-2022-1388 by multiple threat actors. This CVE impacts all F5 BIG-IP firmware versions released prior to May 4, 2022.  ...
Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape

Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape

Synopsis In this paper, EclecticIQ analysts examined various drivers of the Ukraine-Russia war to identify and describe possible outcomes for cyber and technology in the context of the ongoing Ukraine-Russia war. Analysts ...

The Password Is Becoming Passé, Let’s Celebrate World Secure Sign-On Day

| | Industry
For eight years, World Password Day has served the important purpose of reminding users to change and secure their passwords to protect identities, data and systems. Today, however, passwords are only one ...
saas vendor statistic

Should You Build or Buy B2B SaaS SSO?

| | Blog, Industry
Don’t struggle to build this critical capability only to find you don’t support your potential customers’ identity platform of choice. Datawiza offers a No-Code approach to supporting every identity solution. If you’re ...
Cyber Resilience and Data Confidentiality are Emerging Components of Healthcare

Cyber Resilience and Data Confidentiality are Emerging Components of Healthcare

April 7th is World Health Day, and it also marks the founding of the UN’s World Health Organization (WHO) in 1948. The goal of the WHO and World Health Day is to ...
Attack Patterns Produce Growing Losses Targeting Mutual Vulnerabilities Endemic to Decentralized Finance

Attack Patterns Produce Growing Losses Targeting Mutual Vulnerabilities Endemic to Decentralized Finance

Synopsis In 2021 cryptocurrency surpassed $1 trillion in total market value for the first time (). Along with that legitimate growth, the raw value of illicit transaction volume reportedly reached its highest ...

Defending Firmware in the Firmament

| | Industry
The recent attacks against the ViaSat satellite network in February and March of this year have gone largely unnoticed amid the din of the Russian assault on Ukraine ...