Overview Cybercriminals are continually evolving their tactics to bypass security measures, and a new phishing attack leveraging an advanced...
Resources
News
View All
Navigating Cybersecurity and Operational Resilience in the SEC’s 2025 Examination Priorities
Introduction: A New Era of Cyber Vigilance In an increasingly digitized financial landscape, the U.S. Securities and...
The CannonDesign Ransomware Attack & How MDR Can Prevent Business-Disrupting Cyber Threats
The Incident: Ransomware Strikes a Leading Architectural Firm w/ 1,500 Employees In January 2023, CannonDesign, a...
Videos/Podcasts
View All
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Threat Advisories
View All
Voldemort Malware Exploiting Google Sheets
SUMMARY A new malware campaign was recently identified, which leverages Google Sheets as a command-and-control (C2) platform. This campaign...
Critical Vulnerability in SonicWall Firewalls Allows Unauthorized Access
Summary SonicWall issued patches for a critical vulnerability (CVE-2024-40766) affecting its firewalls. The flaw could allow unauthorized...
Lazarus Group Exploits Windows Driver Zero-Day to Deploy Rootkit
SUMMARY The Lazarus hacking group exploited a zero-day vulnerability in the Windows AFD.sys driver (CVE-2024-38193) to elevate privileges and...
Flyers
View All
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Blogs
View All
Penetration Testing 101
In a world driven by constantly growing technology, where cyber threats and data breaches are common, proactive security measures must be taken. Cybersecurity is a critical aspect that can deeply impact or cripple any company. As businesses rely on technology more and more to store, process, and...
What is an Incident Response Plan and Why is it Important?
An incident response plan is a document that outlines the needed procedures, steps, and regulations organizations must go through in the case of a virtual threat (data breach) or a physical threat (natural disaster or power shortages). Implementing a cyber breach incident response plan within the...
Incident Response Services
In today's digital landscape, cyberattacks are becoming increasingly common, and businesses need to be prepared to respond quickly and effectively when a data breach occurs. This is where incident response services come in. Blackswan’s Incident response services are a critical component of...
