Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Kilian Englert

Threat Update 39 – Let Me Google That PII On You

Cloud collaboration tools like Google Drive are ubiquitous, but in our work from anywhere world, IT and security often face challenges understanding how and where personal accounts intermingle with corporate...

Read More

ReConnect – (h)Active Directory & Automation Engine

Most cyberattacks seem to have a number of common patterns like targeting Active Directory to get wider and deeper in an organization, with the ultimate goal of finding and stealing...

Read More

Threat Update 38 – The Darkside Strikes Back

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space. Join Kilian and Kyle Roth from the...

Read More

Threat Update 37 – Is SSO the new (h)Active Directory?

As organizations continue moving to cloud services at a breakneck pace, the adoption of SSO solutions has been a safe and effective way for IT teams to enable and control...

Read More

Threat Update 36 – A Supply Chain Attack By Any Other Name

The SolarWinds supply chain attack was seen as a wake-up call for many in business, IT, and security. Both attackers & defenders took notice of the attack’s effectiveness, and created...

Read More

Threat Update 35 – Healthcare Data at Risk

COVID-19 provided fertile ground for attackers to sow confusion and take advantage of healthcare organizations on the front lines. From hospitals triaging patients around the clock to pharmaceutical companies developing...

Read More

Threat Update 34 – Isn’t the Internet Supposed to be Bombproof?

The FBI recently averted a potential attack on the AWS cloud – and in the process raised many questions about the stability and redundancy of “the cloud” and the technology...

Read More

Threat Update 33 – S3 Security Suggestions & Cyber Insurance Targets

Question: What does S3 security, and cyber insurance have in common? Answer: We discuss them in the video today! That was a bit of a trick question, but two very...

Read More

Threat Update 32 – Lemon Duck Floats on Exchange ProxyLogon Vulnerability

What’s better than cryptocurrency? FREE cryptocurrency, right? Not if you’re one of the many victims of the Lemon Duck cryptomining botnet who is footing the bill for the “free” (to...

Read More

Threat Update 31 – Now are the Zero Days of our Discontent

Have you ever wanted to get into a concert, or movie, but you couldn’t get a ticket? Probably not recently, but in this remote age, we’ve all experienced something similar...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.