How VulnDB Is Helping Organizations Prevent Future Ransomware Attacks

How VulnDB Is Helping Organizations Prevent Future Ransomware Attacks

For over 300,000 vulnerabilities, Flashpoint now provides our Ransomware Likelihood score. This capability can only be found in VulnDB, the most comprehensive source of vulnerability intelligence available. The post How VulnDB Is ...
Timeline: CISA and the Biden Administration’s Impact on Cybersecurity

Timeline: CISA and the Biden Administration’s Impact on Cybersecurity

The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through with plans to implement new mandates intended, hone regulations, and improve the nation’s security posture. The post ...
Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found

Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found

An Advanced Persistent Threat (APT) is a malicious actor who possesses extraordinary skill and resources—enabling them to infiltrate and exfiltrate an organizations’ network. The post Advanced Persistent Threat (APT) Groups: What Are ...
Combining Cybersecurity with Gaming: Cheats, Insider Threats, Ransomware and More

Combining Cybersecurity with Gaming: Cheats, Insider Threats, Ransomware and More

The video game industry has grown considerably since its introduction in the early 1970s, with analysts believing the market to be worth $321 billion by 2026. As such, the gaming industry faces ...
New Microsoft Exchange Server Zero-Day Vulnerabilities

New Microsoft Exchange Server Zero-Day Vulnerabilities

Politics and Policy Keynotes: Nord Stream 1 & 2 Pipeline Destruction Overshadows Moscow Granting Citizenship to Former NSA Contractor Edward Snowden In late September, Danish armed forces discovered leaks from undersea pipes ...
Common Attack Patterns Still Feature in Modern Cyberattacks

Common Attack Patterns Still Feature in Modern Cyberattacks

Synopsis The Analyst Prompt Issue #18 briefly explores the hype around zero-day vulnerabilities and the benefit of focusing on tactics and techniques featured in common threats and attack patterns rather than highlighting ...
provenance cybersecurity Akamai

The Power of Provenance: From Reactive to Proactive Cybersecurity

While next-gen firewalls (NGFW), extended detection and response (XDR) and other security solutions do a great job of detecting and thwarting cyberattacks, it’s just too common for a sneaky or camouflaged threat ...
Security Boulevard

Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks

State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat ...
Weathering Russian Winter: The Current State of Russian APTs

Weathering Russian Winter: The Current State of Russian APTs

Russian Advanced Persistent Threats (APTs) It’s no secret that Russian Advanced Persistent Threats (APTs) are a significant burden on cybersecurity teams. For years, organizations have been bombarding their systems with patches and ...
The Original APT: Advanced Persistent Teenagers

The Original APT: Advanced Persistent Teenagers

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection ...