ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

Zero-Trust Network Access: Why so Many Teams Get it Wrong

Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. Why are so many organizations getting it wrong? ...
Security Boulevard
GRIT Ransomware Report: February 2024

GRIT Ransomware Report: February 2024

Additional contributors to this report: Nic Finn, Jason Baker, Justin Timothy, Ryan Silver February 2024 was an utterly chaotic month […] ...

Guarding Your Business: A Guide to Employee Training for Cybersecurity Vigilance

Protecting your business from scams and cybersecurity threats not only bolsters your business’s practices but also maintains your client’s trust. Without these safeguards, your business could fall victim to irreversible issues like ...
Jenkins CI/CD vulnerability

Threat Groups Rush to Exploit JetBrains’ TeamCity CI/CD Security Flaws

The cyberthreats to users of JetBrains’ TeamCity CI/CD platform continue to mount a week after the company issued two fixes to security vulnerabilities, with one cybersecurity vendor noting a ransomware attack that ...
Security Boulevard
Threat Bulletin

BianLian GOs for PowerShell After TeamCity Exploitation

Contributors: Justin Timothy, Threat Intelligence Consultant, Gabe Renfro, DFIR Advisory Consultant, Keven Murphy, DFIR Principal Consultant Introduction Ever since Avast […] ...

Response to ScreenConnect’s Recent Zero-day Vulnerability Exploitation

AttackIQ has released a new assessment template in response to the recent wave of zero-day vulnerability exploits affecting ConnectWise’s ScreenConnect software. This assessment template comprises the various Tactics, Techniques, and Procedures (TTPs) ...
CSPM, ASPM, CISA cybersecurity healthcare

Change Healthcare Gets Pharmacy Systems Up After Ransomware Attack

There is some relief coming for beleaguered pharmacies, hospitals, and patient now that UnitedHealth Group has the electronic prescribing systems for its Change Healthcare business up and running after being down for ...
Security Boulevard
Cybersecurity Insights with Contrast CISO David Lindner | 3/8/24

Cybersecurity Insights with Contrast CISO David Lindner | 3/8/24

Insight #1 If you’re not performing routine tabletop exercises to ensure that your organization is protected from cybersecurity vulnerabilities, you should be. It's one thing to have detailed processes for executing during ...
Boeing Citrix Bleed Exploitation

LockBit Ransomware Affiliates Leverage Citrix Bleed Vulnerability (CVE-2023-4966)

| | Exploits, Ransomware
Citrix Bleed is being leveraged by LockBit ransomware affiliates to compromise organizations using CVE-2023-4966 ...
NetApp data broker FTC location data

NetApp Leverages AI to Make File System Ransomware Resistant

NetApp embedded artificial intelligence capabilities in its ONTAP file system that can identify ransomware threats in real time ...
Security Boulevard