A majority of ransomware activity resulted from three leading groups. Beazley Security Labs also identified interesting trends with infostealers, including sophisticated techniques to deliver and obfuscate the malware, along with new entrants rising to fill demand.
Log management is a critical component of any organization’s security posture and should be evaluated regularly as its environment changes.
Just as physical exercise provides the body with the conditioning to handle additional stress, cyber security exercises help your company build and strengthen critical reflexes that could minimize or even prevent cyberattacks.
Behavior-based detection is the modern standard for security as traditional AV became obsolete.
Beazley Security has observed several instances of threat actors taking advantage of poor account hygiene to cause damage to businesses. Here are some tips.
Beazley Security has observed a number of tactics and targets related to this group that may help your company better protect itself against this new threat.
A trend involved using ransomware against VMware ESXi server hosts to affect as many systems in an environment as possible, even if they are virtual machines.
September 2022 was a bad month for ransomware. Times change but you need to stay vigilant.
Once an email account has been compromised, bad actors will go to town, often looking for ways to defraud a company's customers, partners, or employees.
Savvy threat actors know that the winter holidays mean that many organizations have fewer resources available to monitor their networks, creating opportunities for attack.
Network segmentation is a critical security measure for any network because it works on multiple levels to protect data and devices, as well as reduce and remove attack vectors.
AI content generation has dominated social media cycles recently. Ranging from a myriad of positive, helpful, and creative solutions of all sorts of tasks, to much more malicious purposes.
Email Spoofing is a technique involving sending emails with a fake sender address, stealing the identity of a real user that is typically trusted in the eyes of the victim.