GUEST RESEARCH: Barracuda Networks, a leading provider of cloud-first security solutions has released new research showing that lateral movement is the clearest sign of an unfolding ransomware attack, catching just under half (44%) of incidents. A quarter (25%) of incidents were detected when the attackers started writing or editing files, and 14% were unmasked by behavior that didn’t fit with known activity patterns. The findings are included in Barracuda’s annual Threat Spotlight on ransomware, which explores the main ransomware attack patterns over the last 12 months.
GUEST RESEARCH: Tenable — the exposure management company,has disclosed that its Tenable Research Team has discovered a critical information disclosure vulnerability in Microsoft’s Copilot Studio via a server-side request forgery (SSRF), which allowed researchers access to potentially sensitive information regarding service internals with potential cross-tenant impact. This vulnerability exists due to improper handling of redirect status codes for user-configurable actions within Copilot Studio. This follows the team’s recent discoveries of flaws in Microsoft’s Azure Health Bot service, Azure Service Tags and three vulnerabilities in the Azure API Management service.
GUEST RESEARCH: Dynatrace also named a Leader and positioned furthest for Vision and highest in Execution in the 2024 Gartner Magic Quadrant for Observability Platforms
GUEST RESEARCH: In the aftermath of the recent CrowdStrike global IT outage, which affected 8.5 million Microsoft Windows devices and led to widespread disruptions in airlines, healthcare providers and retail payment terminals, the fragility of critical infrastructure has come into sharp focus.
GUEST RESEARCH: Fastly, a leader in global edge cloud platforms, today released the Fastly Threat Insights Report, which found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to uncover and exploit software vulnerabilities, revealing an alarming trend in attacks spreading across a broader target base. This new report provides the latest attack trends and techniques across the web application and API security landscape.
GUEST RESEARCH: APAC organisations are increasingly relying on artificial intelligence and machine learning (AI/ML) enabled solutions to tackle a wide array of security challenges around Application Programming Interfaces (APIs), according to F5’s (NASDAQ: FFIV) inaugural 2024 Strategic Insights: API Security in APAC report. The report examines the challenges and opportunities in API security in Asia Pacific (APAC), as APIs continue to power the region’s digital experiences.
GUEST RESEARCH: Cyber resilience research commissioned by Cohesity, a leader in AI-powered data security, reveals organizations overestimate their cyber resilience capabilities and maturity, leading to significant business continuity disruptions and ransom payments.
GUEST RESEARCH: Phishing attacks featuring an advanced, stealthy technique designed to exfiltrate a wide range of sensitive information have been observed by Barracuda threat analysts.
GUEST RESEARCH: Phishing attacks featuring an advanced, stealthy technique designed to exfiltrate a wide range of sensitive information, according to a new blogpost from Barracuda Networks.
GUEST OPINION: As organisations navigate the challenges of remote work, effective business travel has become crucial, providing opportunities for market expansion, valuable insights, and professional growth. However, new research from SAP Concur highlights the complexities involved in maintaining this essential function. The 2024 Global Business Travel Survey examined trends and challenges faced by 3,750 business travellers and 600 travel managers across global markets in the last year.
COMPANY NEWS: Company Placed Highest in Ability to Execute and Received the Highest Scores in Four of Five Use Cases in the Critical Capabilities report
GUEST RESEARCH: Researchers at Infoblox and Eclypsium have discovered that a powerful attack vector in the domain name system (DNS) is being widely exploited across many DNS providers. We have found that over a dozen Russian-nexus cybercriminal actors are using this attack vector to hijack domain names without being noticed. We call this the Sitting Ducks attack.