Kaseya VSA Security Breach
Overview | Kaseya VSA
On July 2, 2021, right before Americans started their long, Independence Day weekend, hackers once again made their way to the top of the news headlines. This time, the victim of…
July 12, 2021/by ProficioOn July 2, 2021, right before Americans started their long, Independence Day weekend, hackers once again made their way to the top of the news headlines. This time, the victim of…
DarkSide Ransomware
Overview | Darkside Ransomware
DarkSide ransomware was first discovered in the wild in August, 2020. It runs a Ransomware-as-a-Service (RaaS), whereby affiliates are able to deploy the ransomware for…
May 20, 2021/by BrockWatsonDarkSide ransomware was first discovered in the wild in August, 2020. It runs a Ransomware-as-a-Service (RaaS), whereby affiliates are able to deploy the ransomware for…
Codecov Breach
OVERVIEW | Codecov Breach
Supply chain attacks are far from new. We previously covered the SolarWinds attack, which may be the biggest software supply chain attack disclosed, as well as the most damaging…
May 3, 2021/by Ardan TohSupply chain attacks are far from new. We previously covered the SolarWinds attack, which may be the biggest software supply chain attack disclosed, as well as the most damaging…
Hafnium – Microsoft Exchange Server 0-Day Vulnerability
OVERVIEW | 0-day
As early as January 6, 2021, multiple Microsoft Exchange 0-day vulnerabilities had been publicly disclosed. These 0-day vulnerabilities were found to be actively exploited by the threat…
March 25, 2021/by Ardan TohAs early as January 6, 2021, multiple Microsoft Exchange 0-day vulnerabilities had been publicly disclosed. These 0-day vulnerabilities were found to be actively exploited by the threat…
Phishing in the Wild II
OVERVIEW
Phishing events are commonly seen in the public so the Proficio’s threat intelligence team often receives opportunities to research different type of phishing activities. On the 13th November…
December 7, 2020/by Ardan TohPhishing events are commonly seen in the public so the Proficio’s threat intelligence team often receives opportunities to research different type of phishing activities. On the 13th November…
Ryuk Ransomware
OVERVIEW
Ryuk ransomware was first discovered in the wild in 2018. It is known for using manual hacking techniques and open-source tools to move laterally through private networks and gain administrative…
October 7, 2020/by Ardan TohRyuk ransomware was first discovered in the wild in 2018. It is known for using manual hacking techniques and open-source tools to move laterally through private networks and gain administrative…
Want to stay up to date on the latest in the cybersecurity space?
Sign up for our newsletter today!
Quick Links
- Become a Proficio Partner
- Careers
- Gartner: How To Improve Endpoint Security Form Thank You
- Gartner: How To Improve Endpoint Security Form Thank You
- Identity Threat Detection and Response Service
- Managed Detection and Response MDR Service
- On-Demand Webinar: Overcoming Cloud Security Challenges In AWS Thank You
- SOAR-as-a-Service
- SOC-as-a-Service
- Why Proficio
Proficio
SOC II Type II
Privacy Policy
Terms of Use
Glossary of Terms