Category: Security Operations

Providing Solutions

Countermeasures and observability key to defending against attackers trying to buy security products

The leak of Conti ransomware’s internal chat logs revealed the attackers tried to buy security software so they could figure out how to bypass it and avoid detection

Secrets of a security analyst: Ensuring 24/7 cover

Tips to help you investigate incidents from experienced security analysts

Cyberthreats during Russian-Ukrainian tensions: what can we learn from history to be prepared?

EDITOR’S NOTE: This is an ongoing, live report and will be updated continuously with new information as it becomes available. The report was originally published on February 22, 2022

Vulnerable Exchange server hit by Squirrelwaffle and financial fraud

While Squirrelwaffle leveraged Exchange to spread malspam through hijacked email threads, one thread was spirited away by attackers to trick the target into a money transfer