collaboration
Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem
Implementing shared threat intelligence across an alliance of cybersecurity experts creates a more robust security approach ...
Security Boulevard
Volt Typhoon Malware: US Critical Infrastructure Breached
Wajahat Raja | | Advanced Persistent Threats, APTs, China's embassy, Chinese state-sponsored hacking group, cisa, Citizen Lab, collaboration, CrowdStrike report, Cybersecurity, Cybersecurity News, cybersecurity threats, defense mechanisms, FBI, Five Eyes alliance, influence campaign, LotL techniques, multi-hop proxies, nsa, operational security, PAPERWALL, Reuters, The Hacker News, US critical infrastructure, Volt Typhoon
In a recent revelation, the U.S. government disclosed that the Chinese state-sponsored hacking group, Volt Typhoon has surreptitiously infiltrated critical infrastructure networks within the country for a staggering five-year period. This embedded ...
Does Your Security Team Need a Dedicated Collaboration Tool?
Richard Pidgeon | | chatbots, collaboration, communication, Incident Response, IT Security, out-of-band
Investing in an IT- and/or security-specific collaboration platform ensures your team has tools that align with their IT and security requirements ...
Security Boulevard
Innovation With a Security-First Mindset
Olga Lagunova | | collaboration, Cybersecurity, Innovation, IT, Product, product delivery, security, security-first
Prioritizing a robust security-first position does not have to hinder productivity or the ability of teams to achieve business goals ...
Security Boulevard
Microsoft Storm-1152 Crackdown: Stopping Threat Actors
Wajahat Raja | | Arkose Labs, CaaS, CAPTCHA, collaboration, cyber threat response, cybercrime, Cybersecurity, cybersecurity community, Cybersecurity News, Duong Dinh Tu, extortion, hacking group, industry experts, Information Sharing, Kevin Gosschalk, law enforcement collaboration, legal actions, Linh Van Nguyễn, MGM Resorts, Microsoft, Okta, Ontinue, outlook, Ransomware, scattered spider, Storm-1152, Tai Van Nguyen, Vigilance
In a significant stride against cybercrime, Microsoft has declared victory in dismantling cybercrime operations of Storm-1152. This group, a major player in the cybercrime-as-a-service (CaaS) ecosystem, was involved in selling access to ...
Black Hat: The Importance of Collaboration With Digital Hands’ Charlotte Baker
Shira Rubinoff: This is Shira Rubinoff here at Black Hat, coming at you live. I’m here with Charlotte Baker, CEO of Digital Hands. Charlotte, it’s such a pleasure to see you again ...
Security Boulevard
Maximizing Output: The Link between Cloud Infrastructure Security and Team Productivity
Team Solvo | | Blog, cloud infrastructure security, Cloud Security, collaboration, data protection, team productivity
Effective teamwork and seamless collaboration are crucial for the success of any organization. In today’s digital age, where data is stored and accessed through cloud infrastructure, ensuring robust security measures is paramount ...
The Essential Guide to Securing Hybrid Workplace Environments
From here on out, hybrid and remote work are here to stay. Unfortunately, this seismic shift in the way we work has expanded the attack surface for opportunistic cybercriminals. Mimecast’s 2022 state ...
Security Boulevard
Decentralized IT Clouds Security Team’s Ability to Spot Risks
The shadow IT trend has been underway for some time, but if a recent survey from Zoho ManageEngine is any indication, the amount of decentralized IT decision-making has passed an inflection point ...
Security Boulevard
Auth Token Mining Weakens Microsoft Teams Security
Microsoft Teams users, beware. Anyone signed into the app can have their credentials stolen by miscreants with file system access who follow an attack path recently identified by the Vectra Protect team ...
Security Boulevard