Tuesday, September 10, 2024

The Loop: Ransomware, OpenSSH attacks, and more

The Loop newsletter: What security leaders need to know now
click here
ExtraHop Logo

The LOOP / September 2024

THE LOOP

In this month's edition of The Loop

  • CDK Global Ransomware Attack Stuns a $1.2T Industry
  • Why Next-Gen Security Depends on NDR
  • Threat Briefing for OpenSSH Vulnerabilities
  • Ransomware Is Noisy, Learn to Listen
  • Webinar: Know Your Risk after a Breach

From a debilitating attack against a core supply chain to a high-severity vulnerability with potentially disastrous consequences, this month's newsletter highlights escalating cyber risks—and how they can be countered with network detection and response (NDR).

BLOGS

CDK Global Ransomware Attack Sends Shockwaves Through $1.2 Trillion Auto-Dealer Industry

Car sellers across the U.S. suffered nearly two weeks of operational disruption following an attack by the BlackSuit ransomware syndicate on the CDK Global dealership management system. CDK's stock promptly nose-dived, and it now faces a wave of lawsuits. What can we learn from this?

READ MORE >

NDR Is Crucial for Next-Gen Security Architecture

The evolution to next-gen, AI-powered SIEM is essential to keep pace with attacker innovation. Network detection and response (NDR) can help security teams accelerate the transition with deeper network visibility, enhanced context, targeted detections, and normalized data. Learn how.

READ MORE >

Threat Briefing for OpenSSH Vulnerabilities

ExtraHop's exclusive threat briefings for RevealX™ customers are an exceptional tool for teams to understand the details of new threats and vulnerabilities, and assess their impact. A recently revealed vulnerability in OpenSSH exposes millions of businesses to potentially devastating RCE attacks. This briefing provides contextualized insight into the"regreSSHion" threat to quickly assess and mitigate your exposure—and eradicate any instances lurking in your environment.

READ MORE >

Ransomware is Noisy, Learn to Listen

Lightning Talk: Ransomware Is Noisy, Learn to Listen

Ransomware attackers try to be sneaky, but their tactics generate considerable noise. Attendees at the RSA Conference learned what to listen for at every stage of a breach from initial intrusion to post-compromise movement, evasion, and extortion. Now it's your turn. WATCH NOW >

Dark Reading Webinar: Determining Exposure and Risk In The Event of a Breach

How bad was that breach? Watch this Dark Reading webinar with guest speaker Joseph Blankenship of Forrester to learn how you can get instant answers to urgent questions about blast radius and implement containment without shutting down the network.

REGISTER NOW >



X social icon   Facebook social icon   LinkedIn social icon

ads

Ditulis Oleh : Angelisa Vivian Hari: 9:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive