playbook
-
Developing SOAR (Security Orchestration, Automation, and Response) playbooks can be daunting, especially if it’s your first time using a SOAR platform. The sheer number of design possibilities can make the process feel overwhelming. While vendors might offer out-of-the-box playbooks, these often require significant customization to fit the unique needs of your environment.
-
While security pros are already familiar with terms like data breaches, exploits, and misconfigurations, these phrases are also becoming known to organizations and non-tech leaders as cybersecurity becomes an essential part of business operations.
-
Sep 16, 2024The Hacker NewsIdentity Protection / Incident Response
-
In 2024, ransomware will continue to rank as one of the most pervasive and effective threats to organizations globally. Attackers constantly refine their methods and use ever-more sophisticated attacks to cause maximum damage and attain the highest profit margins. Payments in 2023 smashed through the USD 1 billion mark, and the overall economic damage caused…
-
.bs-section.bs-section-cbd34f7bdb05e2978ca52711176908d80ca48ac3{ background-image: url(https://www.safebreach.com/wp-content/uploads/2023/08/webinar-background.webp);background-position: center center;background-size: cover;} Aug 27, 2024 In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for several new threats, including those discovered via original research by the SafeBreach Labs team. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to…
-
MalBot August 22, 2024, 5:45pm 1 Learn about common techniques and strategies used by threat actors to bypass MFA. Protect your business from cyber attacks with this informative blog post.
-
As the frequency and sophistication of data breaches continue to rise, the need for companies to protect sensitive data and proprietary information becomes increasingly pressing. This reality has highlighted the growing significance of threat library management strategies—a critical process for security professionals to develop and manage a comprehensive threat library, enabling real-time decision-making and effective…
-
This cybersecurity playbook is inspired by Sam Curry’s insights on the crucial role of building relationships in cybersecurity to affect change in information security and the business.
-
.bs-section.bs-section-cbd34f7bdb05e2978ca52711176908d80ca48ac3{ background-image: url(https://www.safebreach.com/wp-content/uploads/2023/08/webinar-background.webp);background-position: center center;background-size: cover;} Jul 30, 2024 Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats by the SafeBreach Labs team. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s…
-
From early June to late July 2024, Russian actors conducted a series of information operations under the code name “Doppelgänger.” These campaigns were particularly active during the unexpected snap elections in France, prompting an investigation by HarfangLab specialists.
-
TL;DR: Cyber liability insurance is essential, but premiums are increasing, and numerous exclusions exist. Important steps to lower premiums include preparation, articulating your risk, and demonstrating progressive improvement in security through measurable metrics. Cyber liability insurance has become an important component of every organization’s cyber strategy. There are several benefits…
-
CISA publishes resilience-planning playbook for critical infrastructure | StateScoop Skip to main content
-
Given the recent slate of massive ransomware attacks that have disrupted everything from hospitals to car dealerships, Cisco Talos wanted to take a renewed look at the top ransomware players to see where the current landscape stands.
-
The Qualys Threat Research Unit has discovered a new “high” severity signal handler race condition vulnerability in OpenSSH’s server software (sshd). According to the research, this vulnerability has the potential to allow remote unauthenticated code execution (RCE) for glibc-based Linux systems. This CVE has the potential to affect 14 million servers. Exploitation of this bug,…
-
.bs-section.bs-section-cbd34f7bdb05e2978ca52711176908d80ca48ac3{ background-image: url(https://www.safebreach.com/wp-content/uploads/2023/08/webinar-background.webp);background-position: center center;background-size: cover;} Jun 26, 2024 Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats by the SafeBreach Labs team. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s…
-
Octo Tempest is a financially motivated cybercrime group that leverages social engineering and identity compromise to gain initial access to an environment. It exploits weaknesses in identity systems to steal data and deploy ransomware.
-
This cybersecurity playbook is inspired by Ira Winkler’s insights on how to understand your organization’s risks but also to effectively communicate the value of cybersecurity investments in business terms.
-
Hospitals and health systems across the country have been returning to paper medical records during IT outages caused by the unceasing number of cyberattacks plaguing the industry.
-
.bs-section.bs-section-cbd34f7bdb05e2978ca52711176908d80ca48ac3{ background-image: url(https://www.safebreach.com/wp-content/uploads/2023/08/webinar-background.webp);background-position: center center;background-size: cover;} May 30, 2024 Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats, including a newly created scenario that leverages AI Generated malware. SafeBreach customers can select and run these attacks and…
-
Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users’ credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail.