It is critical to select strong passwords and properly manage them so they remain secure. Thursday, May 5, 2022 By: Rebecca Taylor, Incident Response World
What to consider when augmenting your SOC operations with an XDR solution Thursday, April 28, 2022 By: Eric Hemmendinger, Senior Consultant Product Management As a
Government-sponsored threat actors collect intelligence to benefit their country, and changes to the political landscape can impact the collection requirements. The war in Ukraine has
Leaks of GOLD ULRICK communications and operational details have not hampered ransomware activity. Thursday, April 21, 2022 By: Counter Threat Unit Research Team Secureworks® Counter
When you’re under attack, the biggest danger you face is typically not the initial breach. It’s what the attacker does after that initial breach—moving laterally
Ransomware attacks have been on the rise, accelerated popularization of remote, increased digital transformation within organizations and increased risk around digital supply chains. The global
Almost two decades after they were developed, the prevalence and usage of quick response (QR) codes have expanded far beyond their original scope. While many
Organizations have historically relied on a piecemeal, ad-hoc approach to managing cybersecurity incidents. However, the approach does not scale as threat actors become more sophisticated,