Kroll's threat intelligence from the Quarterly Threat Landscape report was featured in IT Brew. Laurie Iacono shares her view on why the construction industry is being targeted so heavily by Business Email Compromise: http://ms.spr.ly/6049lDtYX
Kroll Cyber Risk’s Post
More Relevant Posts
-
We're thrilled to be recognized by the OWASP on its Software Assurance Maturity Model (SAMM) practitioners list. This inclusion highlights our commitment to continue improving the software security posture of our client organizations: http://ms.spr.ly/6046lzvQy
SAMM Practitioners
owaspsamm.org
To view or add a comment, sign in
-
Our threat intel team looks into CLEARFAKE, the malicious in-browser JavaScript framework deployed on compromised webpages to deliver information stealers. Read more here: http://ms.spr.ly/6048lK2Qo
To view or add a comment, sign in
-
-
Catch our exclusive briefing on the State of Cyber Defense: Manufacturing Cyber Resilience, where Kroll experts will share insights and analysis on the specific security challenges facing the manufacturing sector: http://ms.spr.ly/6043lJazb
To view or add a comment, sign in
-
-
Each week our cyber threat intelligence team reports on the latest trends they observe from the trenches. This week we covered: 💻 OpenSSH Remote Code Execution Vulnerability 💉 Cisco NX-OS Software Command Injection Vulnerability 👓 Actor Spotlight: KTA014 ⚙ Ransomware Roundup Watch the full briefing here: http://ms.spr.ly/6040lyxRG
July 8 2024 Cyber Threat Intelligence Briefing
https://www.youtube.com/
To view or add a comment, sign in
-
In November 2023, CISA issued guidance on CVE-2023-4966, a vulnerability in Citrix NetScaler ADC and Gateway, also known as Citrix Bleed. This buffer overflow issue can lead to the disclosure of sensitive information and has been exploited by attackers, like the PLAY Ransomware group. Exploitation of this vulnerability could allow for the disclosure of sensitive information, including session authentication token information that may allow a threat actor to “hijack” a user’s session. Read more from our deep dive on PLAY Ransomware: http://ms.spr.ly/6046lH4cu
To view or add a comment, sign in
-
-
Are you prepared for the Digital Operational Resilience Act (DORA)? The deadline for this new regulation is January 17th. Learn more about the core aspects of the regulation, key recommendations and steps to take now: http://ms.spr.ly/6043lDto7
To view or add a comment, sign in
-
-
With more and more innovation and connected products, the manufacturing sector is an attractive target to threat actors. In this exclusive briefing Kroll cyber risk experts will assess the manufacturing sector’s threat landscape. Security and risk leaders in or working with manufacturing businesses won’t want to miss this opportunity to get insight into what threats are facing the manufacturing industry. Register now: https://bit.ly/3L6ygqB Key Takeaways: • The limiting factors to achieving cyber resilience in manufacturing • Most pressing threats facing manufacturing, and which controls have proven the most effective against them • Current threat analysis of the manufacturing sector • Key cybersecurity investments to prioritize
This content isn’t available here
Access this content and more in the LinkedIn app
To view or add a comment, sign in
-
Each week our cyber threat intelligence team reports on the latest trends they observe from the trenches. This week we covered: 🚚 Progress MOVEit Transfer Vulnerability 🔗 Polyfill Supply Chain Campaign 🐀 Malware Spotlight: PARCELRAT 🎣 ONNX Store: Phishing Kits with 2FA Bypass ⚙ Ransomware Roundup Watch the full briefing here: http://ms.spr.ly/6049l8mll
July 1 2024 Cyber Threat Intelligence Briefing
https://www.youtube.com/
To view or add a comment, sign in
-
Kroll and VotingWorks partnered in penetration testing its flagship tool, Arlo. Read more here: http://ms.spr.ly/6041YhRnH #electionsecurity
To view or add a comment, sign in
-