During an IR engagement, Beazley Security discovered threat actors using novel techniques to abuse Windows Defender Application Control (WDAC) to disable EDR.
Misconfiguration of a cloud resource can expose sensitive data or give cybercriminals access to IT and other resources.
Data breaches caused by the intentional actions or negligence of trusted insiders can be hard to prevent, but a combination of risk management, training and technology can help avoid them.
Distributed denial-of-service (DDos) attacks are on the rise again, with cheap tools available to launch them and cybercrminals using DDoS as part of broader attacks.
Cybercriminals steal data because it can be valuable and to back up threats of public exposure and reputational damage. However, your data can be protected from theft with good IT security and risk management.
Because business email compromise (BEC) often relies on social engineering, people are as important as technology in preventing losses from BEC.
Protecting against a ransomware attack requires the right approach to IT security and risk management, including a defence in depth approach to securing your environment.