Monday 11/11
October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors (Check Point)
Check Point’s Global Threat Index for October 2024 reveals a concerning trend in the cyber security landscape: the rise of infostealers and the increasing sophistication of attack methods employed by cyber criminals.
https://blog.checkpoint.com/security/october-2024s-most-wanted-malware-infostealers-surge-as-cyber-criminals-leverage-innovative-attack-vectors/
How to Secure Your Network Infrastructure (Arctic Wolf)
As more organizations turn to the cloud and digital-first operations, network infrastructure is becoming a major target for threat actors, especially as robust, proactive security measures often lag far behind adoption of the technology.
https://arcticwolf.com/resources/blog/best-practices-how-to-secure-your-internet-facing-infrastructure-today/
Tuesday 11/12
Why Identity Security is Your Best Companion for Uncharted Compliance Challenges (CyberArk)
Today, any identity can be configured with thousands of permissions to access services, data and other sensitive resources. This means any identity can become privileged and be exploited to launch attacks or steal confidential data—at any point in time.
https://www.cyberark.com/resources/blog/why-identity-security-is-your-best-companion-for-uncharted-compliance-challenges
Lock IT Down: Rubrik Cloud Security Overview (Rubrik)
As organizations migrate to the cloud, securing production data becomes paramount. But even with extraordinary efforts to shield critical information from cyber threats, data breaches, and accidental loss, bad actors still wreak havoc on cloud environments. And the bad guys aren’t just targeting production environments anymore—they are taking aim at backup data as well.
https://www.rubrik.com/blog/technology/24/11/lock-it-down-rubrik-cloud-security-overview
Wednesday 11/13
Unmasking Phishing: Strategies for identifying 0ktapus domains and beyond (Wiz)
Phishing is a commonly observed technique used by threat actors to gain illicit access to identities, including cloud identities. In this blog post, we will outline several techniques for investigating phishing campaigns by pivoting between phishing landing pages.
https://www.wiz.io/blog/unmasking-phishing-strategies-for-identifying-0ktapus-domains
How to Overcome MFA Challenges for Stronger Security (Adlumin)
Multi-Factor Authentication (MFA) plays a key role in strengthening security, but it’s not a silver bullet against all attacks. This blog will dive into why MFA is essential, despite its limitations, and how it fits into a broader security strategy that can help reduce risks without creating a false sense of total security.
https://adlumin.com/post/how-to-overcome-mfa-challenges-for-stronger-security/
Thursday 11/14
How Hybrid Cloud is Fueling Digital Employee Experience (ControlUp)
With 83% of company workloads now sitting in the cloud, it highlights the critical role the cloud is playing in digital work, and with 74% of enterprises already deploying a hybrid or multi-cloud strategy, it proves how crucial it is to ‘not put all your eggs in one basket.’
https://www.controlup.com/resources/blog/how-hybrid-cloud-is-fueling-digital-employee-experience/
Minimize enterprise password attacks with the latest security strategies (Delinea)
Having a proven strategy and solutions to prevent, detect, and respond to password attacks can help you stay calm amidst the chaos. Read on to learn the fundamentals of password attacks and the latest best practices and recommendations to reduce your risk.
https://delinea.com/blog/enterprise-password-attacks
Friday 11/15
CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management (CrowdStrike)
The integration of Adaptive Shield with the CrowdStrike Falcon platform will provide SaaS security posture management so organizations can manage SaaS application security, continuously assess their risk and detect and respond to threats affecting SaaS apps.
https://www.crowdstrike.com/en-us/blog/crowdstrike-acquires-adaptive-shield-and-integrates-saas-protection/
Launch right into your Citrix environment with Desktop Lock (Citrix)
Direct boot to VDI, or desktop lock, is ideal for organizations where data protection, compliance, and simplicity are top priorities. By locking your users out of the endpoint operating system, you reduce the attack surface available for bad actors. You also keep sensitive data off the endpoint, maintaining it in administrator control inside the data center. The best part? You don’t have to compromise the end user experience either.
https://www.citrix.com/blogs/2024/11/13/launch-right-into-your-citrix-environment-with-desktop-lock/