EDR, MDR, XDR: Choosing the right solution for your business
EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), and XDR (Extended Detection and Response) are either security softwares, technology stacks or services offered by providers that aim to detect threats ...
Unmasking Crypto Scams: The Team Effort Behind the Con
Whether you’re a crypto-skeptic or a crypto-maximalist, it cannot be denied that the mostly unregulated cryptocurrency ecosystem is no stranger to fraud. It has links to multiple types of cyber crime, including ...
Top SOC Reads: January 2023
Welcome to our new blog series, in which ReliaQuest staff members recommend interesting stories that you might find useful in your day to day jobs. This month, I’m joined by my colleagues, ...
SocGholish: A Tale of FakeUpdates
The SocGholish malware distribution network tricks users into downloading a fake update with an embedded payload. Here are the latest details ...
SocGholish: A Tale of FakeUpdates
Editor’s note: Dean Murphy, Brandon Tirado, and Joseph Morales all contributed to this blog. The “SocGholish” (aka FakeUpdates) malware distribution framework has presented a gripping tale of intrigue and suspense for ReliaQuest ...
Vulnerabilities in Q4 2022: The Flaws and Fervor of Exploitation
[email protected] | | Cyber Crime and Dark Web Research, Threat Intelligence, Vulnerability Management
Common security vulnerabilities for Q4 2022 include memory corruption and privilege escalation according to ReliaQuest research ...
Vulnerabilities in Q4 2022: The Flaws and Fervor of Exploitation
[email protected] | | Cyber Crime and Dark Web Research, Threat Intelligence, Vulnerability Management
You may have rested over the December festive period, but cyber criminals were busy, looking to exploit more than 6,200 newly emerged vulnerabilities (aka CVEs—Common Vulnerabilities and Exposures). So now, having rung ...
Ransomware Report: Q4 2022
Ransomware activity stayed at steady levels throughout 2022’s fourth quarter (Q4 2022). Since we bid farewell to ever-present groups like Conti, the world of ransomware has remained a game of whack-a-mole: For ...
MDR Solutions – 5 Things to Consider
With the ever-growing cybersecurity threats companies face today and a shortage of cybersecurity talent, it’s no wonder that many are turning to MDR solutions. Ideally, managed detection and response (MDR) providers can ...
Cloud Security Best Practices To Increase Visibility Across Applications
As enterprises are accelerating the adoption of digital transformation, the attack surface is rapidly expanding into cloud and multi-cloud environments. In order to effectively detect and respond to threats, the visibility that ...