Cybersecurity Tools

How MXDR Services Solve Cyber Talent Shortages

The cybersecurity industry faces an unprecedented talent shortage. In this article, we’ll explore the implications of this shortage and how MXDR services can bridge the gap.  The shortage in cybersecurity expertise presents a significant challenge, affecting various sectors, from businesses to national security. Some notable instances include:  Supply Chains: The June 2023 MOVEit Transfer breach […]

The post How MXDR Services Solve Cyber Talent Shortages appeared first on Heimdal Security Blog.

Cybersecurity Tools

The Traditional Advocates of the Security Perimeter Don’t Want You to Know about Data-Centric Security

In an era defined by continuous media announcements of organizations that have suffered both government and private data breaches and thefts, the security of this invaluable asset has never been…

The post The Traditional Advocates of the Security Perimeter Don’t Want You to Know about Data-Centric Security appeared first on Cyber Defense Magazine.

News & Updates

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients’ data against potential cyber attacks.
The proposal, which seeks to modify the Health Insurance Portability and Accountability Act (HIPAA) of 1996, is part of a broader initiative to bolster the
Threats

rare Сommand in Splunk

The rare command in Splunk helps you find the least common values in a specific field of your data. This is useful for spotting unusual or infrequent events. By default, the rare command in Splunk returns the 10 least common values for a specified field. Find Rare User Agents To identify the least common user agents in your web […]

The post rare Сommand in Splunk appeared first on SOC Prime.

News & Updates

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials. Currently, over 25 extensions, with an install base of over two million users, have been found to be compromised, and customers are now working to figure out their exposure (LayerX, one of the companies involved in
News & Updates

North Korean Hackers Stole $308 Million in Cryptocurrency from Japanese Crypto Company

North Korean (DPRK) cyber actors have been identified as the main suspects behind a $308 million cryptocurrency theft that took place in May 2024. 

North Korea is the main cyber actor operating in the crypto theft space and is responsible for the bulk of incidents, year over year. In fact, the latest investigation from Chainalysis states that North Korean hackers were responsible for 61 percent of all cryptocurrency stolen in 2024. 

In total, DPRK cyber actors are responsible for at least $1.3

Scroll to Top