Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Kilian Englert

Threat Update 38 – The Darkside Strikes Back

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space. Join Kilian and Kyle Roth from the...

Read More

Threat Update 37 – Is SSO the new (h)Active Directory?

As organizations continue moving to cloud services at a breakneck pace, the adoption of SSO solutions has been a safe and effective way for IT teams to enable and control...

Read More

Threat Update 36 – A Supply Chain Attack By Any Other Name

The SolarWinds supply chain attack was seen as a wake-up call for many in business, IT, and security. Both attackers & defenders took notice of the attack’s effectiveness, and created...

Read More

Threat Update 35 – Healthcare Data at Risk

COVID-19 provided fertile ground for attackers to sow confusion and take advantage of healthcare organizations on the front lines. From hospitals triaging patients around the clock to pharmaceutical companies developing...

Read More

Threat Update 34 – Isn’t the Internet Supposed to be Bombproof?

The FBI recently averted a potential attack on the AWS cloud – and in the process raised many questions about the stability and redundancy of “the cloud” and the technology...

Read More

Threat Update 33 – S3 Security Suggestions & Cyber Insurance Targets

Question: What does S3 security, and cyber insurance have in common? Answer: We discuss them in the video today! That was a bit of a trick question, but two very...

Read More

Threat Update 32 – Lemon Duck Floats on Exchange ProxyLogon Vulnerability

What’s better than cryptocurrency? FREE cryptocurrency, right? Not if you’re one of the many victims of the Lemon Duck cryptomining botnet who is footing the bill for the “free” (to...

Read More

Threat Update 31 – Now are the Zero Days of our Discontent

Have you ever wanted to get into a concert, or movie, but you couldn’t get a ticket? Probably not recently, but in this remote age, we’ve all experienced something similar...

Read More

Watch: ReConnect – Ways Attackers Sidestep Your Endpoints

One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...

Read More

Threat Update 30 – No trust? No problem! An Overview of Zero Trust

With the constant barrage of cyberattacks in the news, it would be natural to wonder if there’s a security model to help. Enter Zero Trust! This popular security model has...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.