Syndicated Blog

Blog – ReliaQuest
Make Security Possible

EDR, MDR, XDR: Choosing the right solution for your business

EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), and XDR (Extended Detection and Response) are either security softwares, technology stacks or services offered by providers that aim to detect threats ...
Forum user offers to fund various cyber-criminal endeavors, including cryptocurrency “hype” projects

Unmasking Crypto Scams: The Team Effort Behind the Con

Whether you’re a crypto-skeptic or a crypto-maximalist, it cannot be denied that the mostly unregulated cryptocurrency ecosystem is no stranger to fraud. It has links to multiple types of cyber crime, including ...

Top SOC Reads: January 2023

Welcome to our new blog series, in which ReliaQuest staff members recommend interesting stories that you might find useful in your day to day jobs. This month, I’m joined by my colleagues, ...
A fake update link from SocGholish indicating that a user is running an older version of Chrome and needs to update

SocGholish: A Tale of FakeUpdates

The SocGholish malware distribution network tricks users into downloading a fake update with an embedded payload. Here are the latest details ...
A fake update link from SocGholish indicating that a user is running an older version of Chrome and needs to update

SocGholish: A Tale of FakeUpdates

Editor’s note: Dean Murphy, Brandon Tirado, and Joseph Morales all contributed to this blog. The “SocGholish” (aka FakeUpdates) malware distribution framework has presented a gripping tale of intrigue and suspense for ReliaQuest ...
Exploited vulnerabilities by type, Q4 2022

Vulnerabilities in Q4 2022: The Flaws and Fervor of Exploitation

Common security vulnerabilities for Q4 2022 include memory corruption and privilege escalation according to ReliaQuest research ...
Exploited vulnerabilities by type, Q4 2022

Vulnerabilities in Q4 2022: The Flaws and Fervor of Exploitation

You may have rested over the December festive period, but cyber criminals were busy, looking to exploit more than 6,200 newly emerged vulnerabilities (aka CVEs—Common Vulnerabilities and Exposures). So now, having rung ...
Number of tippers published over 2022, indicating number of ransomware victims

Ransomware Report: Q4 2022

Ransomware activity stayed at steady levels throughout 2022’s fourth quarter (Q4 2022). Since we bid farewell to ever-present groups like Conti, the world of ransomware has remained a game of whack-a-mole: For ...

MDR Solutions – 5 Things to Consider

With the ever-growing cybersecurity threats companies face today and a shortage of cybersecurity talent, it’s no wonder that many are turning to MDR solutions. Ideally, managed detection and response (MDR) providers can ...

Cloud Security Best Practices To Increase Visibility Across Applications

As enterprises are accelerating the adoption of digital transformation, the attack surface is rapidly expanding into cloud and multi-cloud environments.  In order to effectively detect and respond to threats, the visibility that ...