Search

DoD’s Email Leaks Prove We Need Stronger Protocols Now More Than Ever

An email server’s sensitive but unclassified contents, including emails pertaining to USSOCOM operations, were left exposed to anyone on the internet with the server’s IP address. It is time to adopt protocols built from the ground up with end-to-end encryption to protect sensitive collaboration and communications.

What Makes DEV-0537 / LAPSUS$ So Dangerous?

Regardless of how the threat actor gains initial access, reconnaissance & privilege escalation and ultimately, Exfiltration, destruction, and extortion are their aim. DEV-0537 / LAPSUS$ joins its victims’ crisis communication calls and internal discussion boards (Slack, Teams, conference calls, and others) to understand the incident response workflow and their corresponding response.

Search