The Loop newsletter: What security leaders need to know now
click here | The LOOP / September 2024 | |
|
In this month's edition of The Loop - CDK Global Ransomware Attack Stuns a $1.2T Industry
- Why Next-Gen Security Depends on NDR
- Threat Briefing for OpenSSH Vulnerabilities
- Ransomware Is Noisy, Learn to Listen
- Webinar: Know Your Risk after a Breach
From a debilitating attack against a core supply chain to a high-severity vulnerability with potentially disastrous consequences, this month's newsletter highlights escalating cyber risks—and how they can be countered with network detection and response (NDR). | |
BLOGS | CDK Global Ransomware Attack Sends Shockwaves Through $1.2 Trillion Auto-Dealer Industry | Car sellers across the U.S. suffered nearly two weeks of operational disruption following an attack by the BlackSuit ransomware syndicate on the CDK Global dealership management system. CDK's stock promptly nose-dived, and it now faces a wave of lawsuits. What can we learn from this? READ MORE > | | NDR Is Crucial for Next-Gen Security Architecture | The evolution to next-gen, AI-powered SIEM is essential to keep pace with attacker innovation. Network detection and response (NDR) can help security teams accelerate the transition with deeper network visibility, enhanced context, targeted detections, and normalized data. Learn how. READ MORE > | | Threat Briefing for OpenSSH Vulnerabilities | ExtraHop's exclusive threat briefings for RevealX™ customers are an exceptional tool for teams to understand the details of new threats and vulnerabilities, and assess their impact. A recently revealed vulnerability in OpenSSH exposes millions of businesses to potentially devastating RCE attacks. This briefing provides contextualized insight into the"regreSSHion" threat to quickly assess and mitigate your exposure—and eradicate any instances lurking in your environment. READ MORE > | | |
|
Lightning Talk: Ransomware Is Noisy, Learn to Listen | |
Ransomware attackers try to be sneaky, but their tactics generate considerable noise. Attendees at the RSA Conference learned what to listen for at every stage of a breach from initial intrusion to post-compromise movement, evasion, and extortion. Now it's your turn. WATCH NOW > | |
Dark Reading Webinar: Determining Exposure and Risk In The Event of a Breach How bad was that breach? Watch this Dark Reading webinar with guest speaker Joseph Blankenship of Forrester to learn how you can get instant answers to urgent questions about blast radius and implement containment without shutting down the network. REGISTER NOW > | | |
0 comments:
Post a Comment