Tag: EN

Ransomware negotiator, pay thyself!

Rogues committed extortion while working for infosec firms A ransomware negotiator and an incident response manager at two separate cybersecurity firms have been indicted for allegedly carrying out ransomware attacks of their own against multiple US companies.… This article has…

Scaling Your Security with NHIs: Key Insights

How Are Non-Human Identities Redefining Cybersecurity? Where cyber threats continue to evolve and multiply, how can organizations effectively safeguard their digital assets? The answer lies in the emerging focus on Non-Human Identities (NHIs). These machine identities are becoming crucial for…

Empowering Teams with Robust NHI Management

How Can Robust NHI Management Transform Your Cybersecurity Strategy? How non-human identities (NHI) can strengthen your organization’s cybersecurity framework? Efficiently managing NHIs is pivotal for seamless security operations. While human identities rely on usernames and passwords, NHIs involve machine identities,…

Innovating Cyber Defense with Enhanced NHIDR

How Does Managing Non-Human Identities Revolutionize Cyber Defense? How can organizations enhance their defenses while managing the myriad of machine identities that populate their networks? The answer lies in Non-Human Identities (NHIs), which is revolutionizing cyber defense and creating a…

How Ransomware Attacks Leverage Cyber Insurance Policies

Ransomware attacks continue to evolve into sophisticated strategic and psychological operations. Threat actors are always seeking ways to maximize their illicit gains, and they’ve now discovered a powerful piece to leverage: a company’s cyber insurance policy. When attackers gain access…

Unauthenticated RCE in WSUS Puts Organizations at Risk

Microsoft patches WSUS RCE flaw letting attackers gain SYSTEM access. Learn how to secure servers and prevent exploitation. The post Unauthenticated RCE in WSUS Puts Organizations at Risk appeared first on eSecurity Planet. This article has been indexed from eSecurity…

Analysis Playbooks: USB

In 2005, Cory Altheide and I published the first peer-reviewed paper to address tracking USB devices on Windows systems. Over the years, it’s been pretty amazing to see not only the artifacts expand and evolve, but to also see folks…