Ransomware in Context: 2024, A Year of Tumultuous Change

2024 has started off dramatic shifts in the ransomware landscape. In December of 2023 international law enforcement took down the BlackCat leaks site, leading to the group removing all ethical restrictions for their affiliates and declaring all organizations in Western Europe and the United States viable targets to include nuclear power plants and childrens hospitals. […]
Threat Spotlight: Data Extortion Ransomware Threats

Over the last few years, the ransomware landscape has changed significantly. Between 2022 and 2023, ransomware attacks increased by more than 100% year-over-year, with more attacks consisting of double and triple extortion. At a high level, the categories of ransomware can be defined as: Modern ransomware attacks are no longer a lone individual sitting at […]
Implement Continuous Threat Exposure Management: A Quick Guide for 2024

This year, Gartner named “Continuous Threat Exposure Management (CTEM)” as one of the top trends for Optimizing for Resilience. This is a response to increasing attack surfaces and thus cybercrime, and is the approach that best suits the evolving threat landscape. Organizations’ attack surfaces have exponentially increased over the past few years largely due to […]
Modern Cyber Warfare: Crowdsourced DDoS Attacks

Over the past few years, politically motivated threat actors have increasingly gone online to find allies for their causes. While ten years ago most hactivism like this was anonymous, modern actors favoring certain political elements or governments leverage a broader ecosystem. Since Distributed Denial of Service (DDoS) attacks require little technical skill, they offer a […]
Initial Access Broker Landscape in NATO Member States on Exploit Forum

Initial access brokers (IABs) gain unauthorized access to the system then sell this access to other malicious actors. Based on a large sample of IAB posts on the Russian-language hacking forum Exploit.in (Exploit), IABs increasingly target entities within NATO member states, with research revealing recent activity in 21 of 31 countries. Additionally, access to organizations […]
Supply Chain Security and NIS2: What You Need to Know

The Network Information Systems Directive (NIS2) and its predecessor NIS focus on risk management for organizations. The EU states that the NIS is the first piece of EU-wide legislation on cybersecurity with the goal of achieving a high common level of cybersecurity across the member states. The NIS2 will be quite impactful, especially as it […]
Third-Party Cybersecurity Risk Management: A Short Guide for 2024

Third-parties are an important part of your extended enterprise. They’re your vendors, your partners, and your suppliers. They provide some of your business’s most critical services: billing, data storage, or sales. Unfortunately, vendors and suppliers also come along with significant third party cybersecurity risk. Early in January, Gartner named third-party risk cyber management (TPCRM) a […]
NIS2 Compliance: Updated for 2024, Complete Guide

The Network Information Systems Directive (NIS) was published in 2016 and required EU critical infrastructure sectors to meet basic cybersecurity compliance requirements. In October 2024 the second iteration of the Network Information Systems Directive (NIS2) will be going into effect, which will both substantially expand the number of entities required to be compliant in addition […]
Threat Spotlight: New Frontier of AI Exploits

As machine learning (ML) and artificial intelligence (AI) become increasingly complex, they pose new possibilities for organizations and threat actors. Over the last fifteen years, neural networks and deep learning technologies have evolved at a rapid pace. Over the past four years, from the release of GPT1 through today’s GPT4, AI models have evolved from […]
STIX & TAXII Threat Intelligence: A Quick Guide

Among the various tools and frameworks available for cyber threat intelligence (CTI), STIX and TAXII stand out due to their robustness and interoperability. We present a quick guide to STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated eXchange of Intelligence Information). These protocols facilitate systematic sharing, correlation, and management of cyber threat intelligence, and […]