Best Practices for Endpoint Security

In today’s highly technical world, endpoint devices are everywhere. Endpoint devices, such as employee workstations, laptops, tablets, and smartphones, connect to and communicate with an organization’s network. Because they are intertwined within an organization, it often only takes successfully exploiting one endpoint for threat actors to carve a path through an organization’s network to cause […]
Why An MDR Service Provider for Healthcare Organizations Makes Sense

Healthcare organizations collect and process a lot of sensitive data, making them a prime target for opportunistic cybercriminals. Managing security in-house is a complex undertaking, which is why many healthcare organizations look to outsource some or all of their security needs. Here are our top three reasons partnering with a managed detection and response (MDR) […]
Kaseya VSA Security Breach

Overview | Kaseya VSA On July 2, 2021, right before Americans started their long, Independence Day weekend, hackers once again made their way to the top of the news headlines. This time, the victim of the largest ransomware attack was Kaseya, a technology company that sells its technology to other third-party providers, mainly managed service […]
Lessons Learned: Ransomware Attacks in 2021

While ransomware attacks in 2021 never cease to stop, several high-profile occurrences in the first half of the year gained swift notoriety for either the scale of damage they inflicted or the targets they focused on. Here are four of the biggest attacks, and the lesson that can be learned from each. Colonial Pipeline A […]
DarkSide Ransomware Explained

Overview | Darkside Ransomware DarkSide ransomware was first discovered in the wild in August 2020. It runs a Ransomware-as-a-Service (RaaS), whereby affiliates are able to deploy the ransomware for a fee or a cut of the proceeds from successful ransom payments. The DarkSide ransomware group was brought to mainstream attention due to the recent ransomware […]
#HowTo: Identify and Appoint the Right Security Partner for Your Organization

This article originally appeared in InfoSecurity Magazine In the field of cybersecurity, finding a partner you trust can be daunting. It’s an area that still creates uncertainty within many organizations, so it’s no wonder many cybersecurity executives may be hesitant to make this move. But given the mounting list of CISO challenges, from justifying resource requirements […]
Codecov Breach – What You Need to Know

What was the Codecov Breach? Supply chain attacks are far from new. We previously covered the SolarWinds attack, which may be the biggest software supply chain attack disclosed, as well as the most damaging supply chain attack to users. In more recent news, a new cyber-attack similar to the SolarWinds attack was discovered on a […]
The Difference Between An MSSP and An MDR Service Provider

What is the difference between an MSSP and an MDR service provider (and everything in between)? As any industry evolves, it is common for new categories of products and services to proliferate. In the case of cybersecurity services, many of the new services have been introduced to respond to the evolving threat landscape or to […]
Hafnium – Microsoft Exchange Server 0-Day Vulnerability

OVERVIEW | 0-day As early as January 6, 2021, multiple Microsoft Exchange 0-day vulnerabilities had been publicly disclosed. These 0-day vulnerabilities were found to be actively exploited by the threat group Hafnium. This appears to be a nation-state attack that is currently targeting as many as 30,000 organizations in the United States and hundreds of […]
2020 Threat Hunting Campaigns and the Lessons Learned

Society has learned a lot of lessons in 2020. While many may focus on the covid-19 pandemic, it’s fair to say that cybersecurity faced its share of challenges too – especially with many organizations being thrust into a remote working environment. For Proficio’s Threat Intelligence team, we had to face a slew of new threats, […]
Key Takeaways from the SolarWinds Compromise

FireEye has recently released a detailed report on a global supply chain cyber-espionage campaign that utilizes compromised Solarwinds Orion software updates to distribute a backdoor codenamed “SUNBURST” by FireEye. This particular campaign was announced by FireEye to be associated with a breach reported earlier on the 8th of December 2020, where it was revealed that […]
Phishing in the Wild II

OVERVIEW Phishing events are commonly seen in the public so the Proficio’s threat intelligence team often receives opportunities to research different type of phishing activities. On the 13th November 2020, a client had requested for assistance on a phishing incidence that had occurred within their environment. In this blog, we share some of the findings […]