Join our presentation ‘Unboxing the black box: Vulnerabilities and incident handling in ‘appliances’’ at Sikkerhetsfestivalen! Over the past year, a large number of critical vulnerabilities have been uncovered in so-called ‘appliances’, and we see that threat actors are increasingly targeting this type of product. This includes both targeted attacks and opportunistic mass exploitation of vulnerabilities. In this talk we will discuss our experiences with vulnerabilities and incident handling in appliances to shed light on the issue from both an attacker and defender perspective. Both mnemonicans Tor E. Bjørstad, Principal security consultant, and Kristoffer Svensen Solberg, Security Consultant, will take the stage to go into the details. More info about this session: https://lnkd.in/df73WaPe More info about all of our sessions at #Sikkerhetsfestivalen: https://lnkd.in/dgNrVrbR. See you there!
mnemonic’s Post
More Relevant Posts
-
Terrifying tales of tradecraft and cyber threats don’t need to keep you up at night—especially when you have the right tools to defend yourself. Join us for a webinar as Dray Agha and Anton Ovrutsky explore real-world #cybersecurity horror stories. Get a look at today’s #cybercriminal tactics, dive into real-world case studies, and gain the insights and resources you need to protect against threats.
To view or add a comment, sign in
-
Terrifying tales of tradecraft and cyber threats don’t need to keep you up at night—especially when you have the right tools to defend yourself. Join us for a webinar as Dray Agha and Anton Ovrutsky explore real-world #cybersecurity horror stories. Get a look at today’s #cybercriminal tactics, dive into real-world case studies, and gain the insights and resources you need to protect against threats.
Surviving Cybersecurity Scares: Fighting Fear with Awareness
webinars.huntress.com
To view or add a comment, sign in
-
Terrifying tales of tradecraft and cyber threats don’t need to keep you up at night—especially when you have the right tools to defend yourself. Join us for a webinar as Dray Agha and Anton Ovrutsky explore real-world #cybersecurity horror stories. Get a look at today’s #cybercriminal tactics, dive into real-world case studies, and gain the insights and resources you need to protect against threats.
Surviving Cybersecurity Scares: Fighting Fear with Awareness
webinars.huntress.com
To view or add a comment, sign in
-
Terrifying tales of tradecraft and cyber threats don’t need to keep you up at night—especially when you have the right tools to defend yourself. Join us for a webinar as Dray Agha and Anton Ovrutsky explore real-world #cybersecurity horror stories. Get a look at today’s #cybercriminal tactics, dive into real-world case studies, and gain the insights and resources you need to protect against threats.
Surviving Cybersecurity Scares: Fighting Fear with Awareness
webinars.huntress.com
To view or add a comment, sign in
-
Terrifying tales of tradecraft and cyber threats don’t need to keep you up at night—especially when you have the right tools to defend yourself. Join us for a webinar as Dray Agha and Anton Ovrutsky explore real-world #cybersecurity horror stories. Get a look at today’s #cybercriminal tactics, dive into real-world case studies, and gain the insights and resources you need to protect against threats.
Surviving Cybersecurity Scares: Fighting Fear with Awareness
webinars.huntress.com
To view or add a comment, sign in
-
Don't be so sure! Hackers may be laughing at your defenses right now -- It's time to take action. Lares Red Teaming Services goes beyond traditional measures, simulating real-world threats to stress-test your defenses. 📚 Dive into our blog post, "Mastering Red Teaming for Enhanced Security," and don't wait for a breach to reveal your vulnerabilities. Connect with Lares today to unmask your blind spots and strengthen your defenses. Read the blog: https://buff.ly/48R6YxF
To view or add a comment, sign in
-
Business development manager at Orange Cyberdefense. "Leading Business Development in Advanced Cybersecurity Solutions"
Cybersecurity Update: Emerging Threats Identified by Our Managed Threat Detection Team 🚨 In May and June 2024, our CyberSOC team detected a malicious campaign targeting two clients in France. Threat actors used fake videos, such as recent TV series episodes, to deploy CryptBot and Lumma stealer payloads. Our CERT analysts swiftly analyzed this threat, and a detailed advisory was shared with our clients on July 12th via our Orange Cyberdefense CERT portal, World Watch and customer portal. However, on July 31st, we identified a new iteration of this campaign, now targeting organizations globally. This wave, which likely started in mid-July, involves a recurring malware loader we've internally tracked as Emmenhtal. This sophisticated loader, active since at least February 2024, employs several malicious HTA, JavaScript, and PowerShell stages to deliver commodity RATs and infostealers. Emmenhtal’s variants still have low detection rates on #VirusTotal, indicating a persistent and evolving threat. Full article on our Orange Cyberdefense website: https://lnkd.in/eP_-ZqvF Authors: Marine P. and 🇲🇫 Alexandre Matousek Special thanks to Simon Vernin, Roland Roure, Simonet Florian, and Rebecca Attali #CyberSecurity #ThreatDetection #Malware #CyberDefense #OrangeCyberdefense
To view or add a comment, sign in
-
Shoutout to my colleagues at Info-Tech Research Group for putting together a fantastic Threat Landscape Briefing! Michel Hébert, Ph.D.; Carlos Rivera; Ahmad Jowhar; & Jon Nelson, CISSP, CEH Discover this month's Threat Landscape Briefing featuring articles such as: · Deepfake Technology Tricks Worker Into Paying Out $25 Million · Heads Up, Bootloaders: Critical Shim Flaw Opens Door to Remote Code Execution · CISA Warns of Active Exploits: Patch Fortinet Products Against Critical Vulnerabilities · 2023: A Banner Year for Ransomware · ResumeLooters Steal Personal Data of 2 Million Using Exploits Almost as Old as the Internet Learn more here 👉 https://lnkd.in/gS3x6WQD Info-Tech Research Group #Security #SecurityThreat #SecurityThreatLandscape
To view or add a comment, sign in
-
Great upcoming lunch and learn on 24th of July – where the Vectra AI Sydney team will dissect Scattered Spider's techniques and showcase why it is imperative for organizations to fortify their defenses against sophisticated cyber adversaries. - Protect against unauthorised access to data in cloud application environments. - Techniques employed by attackers to bypass MFA: social engineering, token theft (a risk we can all brush up on). - Real-life examples of recent MFA bypass attacks. Actionable insights to reduce risk will also be shared. David Sajoto Chris Fisher Scott Herdman Katherine Toh Roblé Ali FIP, CIPM, CIPPE, GRCP Steven Carlin Richard Li
🌟 Join Us for an Exclusive Workshop in New South Wales, Australia! Discover the latest in cybersecurity at our in-person Lunch & Learn threat briefing hosted by Vectra AI. Whether you're an IT professional, cybersecurity enthusiast, or simply curious about protecting your organization, this event is for you! 📅 Date: July 24, 2024 📍 Location: The Great Room - Castlereagh St, New South Wales, Australia During this briefing, our experts will take you through our research and expertise on this threat group, including: > Mitre Techniques attributed to scattered spider > Other ransomware crews and similarities in techniques > Defensive measures to these techniques Don’t miss this opportunity to enhance your cybersecurity knowledge and network with professionals in your field. Seats are limited, so secure your spot today! 🔗 Register Now: https://lnkd.in/g_CqM-ei
NSW Lunch and Learn - Jul 24
info.vectra.ai
To view or add a comment, sign in
-
Cybersecurity Leader | Bridging Business and Cybersecurity | Building High-Performance Teams | Driving Solutions Excellence | Empowering Teams for Growth and Success
How do YOU integrate your IT and OT environments? Is it seamless and secure? Catch this episode of Palo Alto’s “Threat Vector” for great insights! At World Wide Technology we have an amazing IoT/OT Architect group led by Gregory Nicozisis and Enrique Martinez, MA, CISSP…. Reach out to us for more information!
OT and IT: the ultimate partnership, but a security challenge! 🔒 Don’t miss 'The State of OT Security' episode of Threat Vector. David Moulton, Qiang Huang and guest speaker Michela Menting discuss securing OT in industries facing ransomware & nation-state threats, and how organizations can stay secure in a world where OT and IT are seamlessly integrated. Tune in for key insights: https://bit.ly/3Yf2768
To view or add a comment, sign in
9,394 followers