Latest Insights
All Topics
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- Cybersecurity News
- Education
- C-Suite Accountability
- Security Hygiene
- Endpoint Detection and Response
- Ransomware
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
Cybersecurity Industry
Threat Intelligence
Data Protection
Hygiene Tip: Shut Down Attackers Harvesting Cached Browser Credentials
Recently, ActZero learned that ransomware actors are harvesting credentials from browsers during their attack. In recent attack chains our threat researchers have seen that, once the attacker gains a foothold, they are using Living-off-the-Land (LoTL) attacks to harvest the cached credentials from..
Managed Detection and Response
MDR: An Origin Story
A hero's origin story usually accounts for the source of two things: their power, and their motivation. Often, the audience is already familiar with the hero’s current state. But, what is interesting about these stories is the context from the backstory, and how it enables a great advantage in the..
Cybersecurity Industry
Ransomware
How to Disrupt Quantum Locker Ransomware TTPs
2022-07-14 Update: A breach of 657 providers totalling over 1.9 million patient records from an attack in February of this year was just reported. Quantum Ransomware has been attributed / implicated in this breach. Read on for how to disrupt the TTPs known to be part of this attack. Getting its..
Cybersecurity Industry
Managed Detection and Response
Why Ransomware-as-a-Service is a Problem
As a security engineer specialized in systematizing automated response to security risks, I prioritize understanding emergent threats using tools like Threat Modeling to guide the process. Through the course of my decades long career, I have witnessed the technological and tactical evolution of..
Cybersecurity Industry
Why Automated Response Is Critical in Stopping Threats Before They Spread
Mean Time to X (Detect, Alert, Respond) orMTTX metrics are frequently chosen when people want to determine a response system's ability to respond to an attack. This system will consist of tooling and people.
Cybersecurity Industry
Protect your supply chain from attacks like Kaseya Ransomware
Supply chain attacks exist when a 3rd party’s software or hardware used in an organization’s processes are used to attack it. Because a supply chain attack is launched from a partner or peer, it is often extremely difficult to detect as it is delivered from a trusted channel. Additionally, by..
Why You Should Think Like A Hacker
The attacker vs defender mindset must be pervasive in the design, implementation and testing of every security technology for it to be successful. This isn’t just in thinking like an attacker, but also in welcoming outside testers to find flaws in implementations.As a security solution creator,..
Cybersecurity Industry
Threat Intelligence
Early Detection of Exchange Zero Day? Hindsight Indicators
In hindsight, it should have been easy to find the needle in the haystack of haystacks...