In the intricate dance between cyber attackers and defenders, understanding adversary behavior is the difference between keeping up with sophisticated attacks or falling behind the evolving threat landscape. For security teams, this often feels like trying to navigate a maze blindfolded since adversaries typically have greater insights into defender strategies than defenders … [Read more...] about Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR
Operations
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Apr 13, 2024NewsroomCyber influence / Warfare The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday announced sanctions against an official associated with Hamas for his involvement in cyber influence operations. Hudhayfa Samir 'Abdallah al-Kahlut, 39, also known as Abu Ubaida, has served as the public spokesperson of Izz al-Din al-Qassam Brigades, … [Read more...] about U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Enhancing IT Operations: Exploring End-to-End Observability
Organizations like yours are increasingly reliant on complex IT infrastructures to support their operations. Pervasive use of Kubernetes and microservices architectures continues to up the ante. Amidst this complexity, achieving comprehensive visibility into systems and applications has become both imperative for ensuring performance, reliability, and security, while also … [Read more...] about Enhancing IT Operations: Exploring End-to-End Observability
How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations
Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money laundering scheme. The malicious application, called XHelper, is a "key tool for onboarding and managing these money mules," CloudSEK researchers Sparsh Kulshrestha, Abhishek Mathew, and Santripti Bhujel said in a report. Details about the scam … [Read more...] about How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations
Iranian APT Group OilRig Using New Menorah Malware for Covert Operations
Sep 30, 2023THNCyber Espionage / Malware Sophisticated cyber actors backed by Iran known as OilRig have been linked to a spear-phishing campaign that infects victims with a new strain of malware called Menorah. "The malware was designed for cyberespionage, capable of identifying the machine, reading and uploading files from the machine, and downloading another file or … [Read more...] about Iranian APT Group OilRig Using New Menorah Malware for Covert Operations
The power of effective log management in software development and operations
,The rapid software development process that exists today requires an expanding and complex infrastructure and application components, and the job of operations and development teams is ever growing and multifaceted. Observability, which helps manage and analyze telemetry data, is the key to ensuring the performance and reliability of your applications and infrastructure. In … [Read more...] about The power of effective log management in software development and operations
North Korean UNC2970 Hackers Expands Operations with New Malware Families
Mar 10, 2023Ravie LakshmananCyber Attack / Malware A North Korean espionage group tracked as UNC2970 has been observed employing previously undocumented malware families as part of a spear-phishing campaign targeting U.S. and European media and technology organizations since June 2022. Google-owned Mandiant said the threat cluster shares "multiple overlaps" with a … [Read more...] about North Korean UNC2970 Hackers Expands Operations with New Malware Families
Why I consolidated my IT and cybersecurity operations in the cloud
More and more organizations are moving their infrastructure and applications to the cloud to increase productivity, drive down costs, and improve operational agility. According to Gartner, 85% of organizations will embrace a cloud-first approach by 2025 and will look to leverage cloud-native technologies wherever they can.With the average organization deploying nearly 90 … [Read more...] about Why I consolidated my IT and cybersecurity operations in the cloud
Tour the RSA Conference 2022 Security Operations Center
EXPOSURE: The Information We Divulge On A Public Wireless Network – The 3rd Annual* RSAC SOC Report Register now for your free tour of the RSA Conference Security Operations Center (SOC), where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored by NetWitness and Cisco Secure. Sign up for a guided tour, where we’ll … [Read more...] about Tour the RSA Conference 2022 Security Operations Center
Secure your Endpoints and Turbocharge your Security Operations with Cisco Secure Endpoint
Keeping up with the ever-changing threat landscape is hard, with new attacks such as ransomware, fileless malware, and other advanced threats emerging every day. Protecting your endpoints becomes even more difficult when your security environment consists of multiple, disparate solutions, making it too complex to effectively manage. Protecting your endpoints can also seem … [Read more...] about Secure your Endpoints and Turbocharge your Security Operations with Cisco Secure Endpoint