Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-04-10 14:30:01 |
Une classe ci-dessus: Support expert pour la défense des recours collectifs pour violation de données A Class Above: Expert Support for Data Breach Class Action Defense (lien direct) |
Entre 2022 et 2024, recours collectifs liés aux violations de données aux États-Unis à la fois à Cybersecurity Posture et un |
Data Breach
Technical
|
|
★★
|
 |
2025-02-18 21:50:13 |
Enhancing Business Email Compromise Incident Response: New Email & Cloud Security Configuration Snapshot (lien direct) |
KEY TAKEAWAYS
Email & Cloud Security Configuration Snapshot can be delivered free as part of BEC investigations, in automated fashion
Snapshot condenses frontline threat intelligence from 1000s of BEC investigations to identify configuration weakness allowing most common BEC attack patterns
Requires no additional client involvement to run
Available for M365 and Google Workspace
Business Email Compromise (BEC) remains one of the most financially devastating forms of cybercrime, with the FBI reporting over $55 billion in BEC losses worldwide over the past 10 years. Requiring little technical expertise, BECs are relatively simple to execute and attackers have found clever ways to bypass most defenses, contributing to the high rate of incidents. Though attackers leverage various intrusion vectors to compromise email accounts, most BEC incidents are worsened by poor email and cloud security configurations, making it easier for attackers to move laterally, exfiltrate data, and increase the overall impact of the attack.
KEY TAKEAWAYS
Email & Cloud Security Configuration Snapshot can be delivered free as part of BEC investigations, in automated fashion
Snapshot condenses frontline threat intelligence from 1000s of BEC investigations to identify configuration weakness allowing most common BEC attack patterns
Requires no additional client involvement to run
Available for M365 and Google Workspace
Business Email Compromise (BEC) remains one of the most financially devastating forms of cybercrime, with the FBI reporting over $55 billion in BEC losses worldwide over the past 10 years. Requiring little technical expertise, BECs are relatively simple to execute and attackers have found clever ways to bypass most defenses, contributing to the high rate of incidents. Though attackers leverage various intrusion vectors to compromise email accounts, most BEC incidents are worsened by poor email and cloud security configurations, making it easier for attackers to move laterally, exfiltrate data, and increase the overall impact of the attack. |
Threat
Cloud
Technical
|
|
★★★
|
 |
2024-12-31 16:12:25 |
"Out-of-the-Box" Detection Coverage: A Critical Metric for Endpoint Security (lien direct) |
Register now: 2024 MITRE ATT&CK Enterprise Evaluation Result Breakdown Webinar.
Back in the summer I wrote a blog around capability versus usability, in which I highlighted that typically industry testing focuses on capability, despite one of the key challenges in the industry being skills. EDR by its nature, is a technical capability and as such the skills gap in this space is even greater. I will always remember a good friend sharing in his keynote, a number of years ago, that there is little point in buying a best of breed solution if you don\'t have the people powers to actually use it.
Register now: 2024 MITRE ATT&CK Enterprise Evaluation Result Breakdown Webinar.
Back in the summer I wrote a blog around capability versus usability, in which I highlighted that typically industry testing focuses on capability, despite one of the key challenges in the industry being skills. EDR by its nature, is a technical capability and as such the skills gap in this space is even greater. I will always remember a good friend sharing in his keynote, a number of years ago, that there is little point in buying a best of breed solution if you don\'t have the people powers to actually use it.
|
Technical
|
|
★★★
|