US President Joe Biden recently signed an executive order (EO) aimed at strengthening network security for US federal government departments, and agencies and contractors working with them. This sweeping directive has arrived in the aftermath of several highly impactful attacks affecting the public and private sectors worldwide. The attacks laid bare organizations’ susceptibility to intrusion and misuse, and they seemingly lit a fire under policy makers. Although directed at the US, the EO is likely to wield a sizable influence on a global scale: fortifying critical infrastructure, hindering malicious activity, compelling technology suppliers to step up their security game, and introducing a more regimented approach to incident response.
The latest work of the notorious Russian state-associated “NOBELIUM” threat group is an email phishing camp...
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
This webinar covers the latest research into impersonating domains and provides a demo of SearchLight’s industry-leading domain monitoring capabilities.
A vulnerability in Kaseya’s virtual system/server administrator (VSA) software has been exploited to deliver the “REvil” ransomware to multiple managed service providers.
The 14th Five Year Plan (FYP) adopted by the People’s Republic of China (PRC) in March 2021 has laid out key areas of focus for the country that are likely to prompt nation-state cyber espionage.
This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed
Rick Holland and Sean Nikkel join Phil Langlois and the team behind the Verizon DBIR to understand some of the key cybercrime takeaways for organizations.
Several Clop members were arrested in association with money laundering, and the officials seized infrastructure the group has used in ransomware attacks globally.
A newly identified advanced persistent threat (APT) group, “Agrius”, has been exposed as the perpetrator of destructive attacks against Israeli organizations since late 2020.
The notorious Russia-based ransomware group “REvil” (aka Sodinokibi) has been blamed for the latest high-profile ransomware attack, on the world’s largest meat supplier.
The latest work of the notorious Russian state-associated “NOBELIUM” threat group is an email phishing campaign against multiple countries and sectors.
A “Conti” ransomware attack on Ireland’s healthcare system, the Health Service Executive (HSE), significantly delayed the delivery of medical laboratory results and affected many outpatient services.
Colonial Pipeline Company fell victim to a cyber attack that resulted in 5,500 miles of its US fuel pipelines being shut down, causing public distress and fears of fuel shortages.
Dark web monitoring is not a use case in and of itself. Instead, it encompasses a variety of different use cases such as exposed credential monitoring, fraud, and insider threat monitoring. If securit
Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.
The team is looking back at three years of ShadowTalk and taking us on a journey through changes in the threat landscape.
This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.