What are the Impacts of Generative AI on Cloud Security?

What is Generative AI? Generative AI is a form of artificial intelligence capable of producing fresh content, including text, images, audio, and video. It accomplishes this by learning the patterns and structure from existing data and then using this [...]

What are the Impacts of Generative AI on Cloud Security?2024-01-26T13:13:57-08:00

Business Email Compromise: The Easiest Route for Threat Actors

BEC, or Business email compromise, is a type of cybercrime that involves attackers manipulating or compromising business email accounts for fraudulent purposes. BEC scams are designed to deceive individuals or organizations into making [...]

Business Email Compromise: The Easiest Route for Threat Actors2024-02-07T11:52:12-08:00

Why are Cloud Threat Actors Thriving?

Impact of Cloud Landscape on Incident Response Cloud incident cases differ from standard incident cases because of the different technology concepts. Currently, malicious actors in cloud environments have it easy because many aspects of the cloud landscape are unknown. [...]

Why are Cloud Threat Actors Thriving?2023-12-18T20:21:28-08:00

Lockbit 3.0 Hits Japan’s Largest Trading Port

On the morning of July 4th, 2023, the Nagoya Harbor Transportation Authority in Japan had trouble accessing their central computer systems and discovered that they had been hacked by LockBit 3.0 ransomware. The ransom demand was received through an office [...]

Lockbit 3.0 Hits Japan’s Largest Trading Port2023-07-29T14:26:54-07:00

BlackSuit Ransomware Targeting Linux and Windows

A new ransomware strain that was discovered in early May 2023 has shown a strong resemblance to Royal ransomware. This new strain BlackSuit, primarily targets Linux systems and Windows. Further analysis from cybersecurity company Trend Micro, shows that BlackSuit and [...]

BlackSuit Ransomware Targeting Linux and Windows2023-07-03T11:49:05-07:00

Enhance Your Cybersecurity Strategy with Endpoint Detection and Response

What is Endpoint Detection and Response (EDR) and why is it important? Endpoint Detection and Response (EDR), is a security technology that helps organizations detect and respond to security threats (ransomware, malware, etc.) on endpoints such as computers, laptops, [...]

Enhance Your Cybersecurity Strategy with Endpoint Detection and Response2023-05-23T16:28:32-07:00

Ransomware Attacks Saw Huge Increase in March 2023

According to NCC Group's Global Threat Intelligence Team, ransomware attacks have seen a significant increase this year. In March 2023, ransomware attacks increased by over 90% compared to February and over 60% compared to March 2022. NCC Group stated that [...]

Ransomware Attacks Saw Huge Increase in March 20232023-05-17T12:17:53-07:00

CISA’s Pilot Program Helps Protect Critical Infrastructure from Ransomware

Earlier this year, CISA (Cybersecurity and Infrastructure Security Agency) launched a new program to help protect critical infrastructure institutions by safeguarding their information systems from ransomware cybercriminals. The two main purposes of this new program, called Ransomware Vulnerability Warning Pilot [...]

CISA’s Pilot Program Helps Protect Critical Infrastructure from Ransomware2023-08-10T22:30:37-07:00