In a flurry of supply chain cyber attacks

In a flurry of supply chain cyber attacks

Supply-chain cyber attacks have become hacker’s most favorite target. Given the domino effect that a cybersecurity breach might trigger—even if just one link of the supply chain is weakened—the outcomes can be disastrous. SolarWinds, Garmin, or Nissan breaches are...
How to Be a Successful CISO & Back Home Satisfied

How to Be a Successful CISO & Back Home Satisfied

according to Matthew Sciberras Insightful talk between Nazar Tymoshyk, CEO of UnderDefense, and Matthew Sciberras, a Chief Information Security Officer at one of the largest igaming companies that exist right now – Betsson Group. They discussed the everyday CISO...
Healthcare Ecosystem: Strategies to Improve Cybersecurity

Healthcare Ecosystem: Strategies to Improve Cybersecurity

Healthcare institutions, large and small, have always been prime target for cybercrime. Lately, healthcare is transitioning from its traditional focus on disease, accidents, etc., toward the prevention and management of chronic conditions. This means that the...
How to Detect CobaltStrike Command & Control Communication

How to Detect CobaltStrike Command & Control Communication

CobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth is explained by the fact that CobaltStrike was leaked multiple times and became more accessible for malicious groups. Below is a statistics made by RecordedFuture for...
The Strategic Partnership Between UnderDefense and SOC Prime

The Strategic Partnership Between UnderDefense and SOC Prime

UnderDefense and SOC Prime Partner to Deliver the world’s largest marketplace for Threat Detection Rules and QueriesNew York, New York – February 24, 2020 – UnderDefense, a leader in supporting organizations around the world to plan, manage, and run successful...