DEFENSESTORM

RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These resources highlight our recent research and success stories.

DefenseStorm
PSA – MICROSOFT MITIGATES DATA EXPOSURE

Threat Alerts

PSA – MICROSOFT MITIGATES DATA EXPOSURE

If you haven’t already, you will likely begin to see cyber news headlines about a massive data exposure related to Microsoft.  While the exposure is bad and nothing to overlook, the report coming from Microsoft is that “ No customer data was exposed, and no other internal services were put at risk because of this issue. No customer action is required in response to this issue.” This was taken directly from Microsoft’s Security Research and Defense page.   

Understanding Business Email Compromise

Insights

Understanding Business Email Compromise

Business email compromise (BEC) is a type of cyberattack that usually occurs through some type of social engineering campaign where the criminals assume the identity of a trusted person or organization and attempt to influence their victims into providing money through transfers or other digital payments, divulging personal information, making phony purchases, providing credentials to accounts, etc

 

Zelle Bank Impersonation Scam

Fraud Squad

Zelle Bank Impersonation Scam

As peer-to-peer (P2P) digital payment platforms like Venmo and Paypal rapidly grew in popularity for their ability to provide easy, convenient money transfers, several major banks collaborated to create Zelle. The new transfer application promised to be “the next big thing” in banking, yielding near-instantaneous transfers directly between banks. Unfortunately, with new digital technology comes increased risk.

PSA – CISA Warns of Hurricane Related Scams

Threat Alerts

PSA – CISA Warns of Hurricane Related Scams

With the recent natural disasters that have occurred, it’s important to be aware that bad actors will attempt to leverage those devasting incidents for gain.  CISA has released a warning urging users to be aware of malicious activity when these types of incidents occur.  Please read the below alert from CISA.

Redefining Cybersecurity Part 5: Cyber Risk Awareness

Insights

Redefining Cybersecurity Part 5: Cyber Risk Awareness

The previous posts in this series have covered topics like shifting from cybersecurity to proactive cyber risk management, reinforcing cyber risk readiness, bridging communication gaps, and harnessing the power of a buyer’s guide to build a robust cyber risk management solution. While these are integral to designing an efficient cyber risk management program, the final and crucial piece of the puzzle is cyber risk awareness. If your employees lack awareness of the constantly evolving threats to your financial institution (FI), they become a significant liability to your security, despite your adherence to the latest recommendations and employment of state-of-the-art technology.

AI and its Impact on Cybersecurity Part 1: Role of AI in Cybersecurity

Insights

AI and its Impact on Cybersecurity Part 1: Role of AI in Cybersecurity

The role of artificial intelligence (AI) has had an unprecedented impact on cybersecurity. AI is transforming daily business practices and enhancing the customer experience for most industries, but it is imperative to effectively balance technological advancement with close oversight while these technologies are rolled out.

Life Savings Lost to a Bank Scam

Fraud Squad

Life Savings Lost to a Bank Scam

A small business owner recently fell victim to a sophisticated bank scam that drained her life savings, where scammers exploited two-factor authentication to gain access and withdraw money from her account. This cautionary story serves as a warning about the increasing prevalence of fraud and emphasizes the significance of using effective fraud detection systems.

NCUA Cyber Incident Notification Requirements

Insights

NCUA Cyber Incident Notification Requirements

NCUA Cyber Incident Notifications Requirement goes into effect September 1, 2023.  The final rule requires that covered institutions notify the NCUA as soon as possible, and no later than 72 hours, after the credit union reasonably believes it has experienced a reportable cyber incident or received a notification from a third party regarding a reportable cyber incident.

Possible LinkedIn Account Hijacking Campaign

Threat Alerts

Possible LinkedIn Account Hijacking Campaign

While nothing official has been published by LinkedIn at the time of this post, accounts on the platform appear to be coming under attack in some type of hacking campaign of unknown origin.  Users are reporting on multiple other outlets that their accounts have been taken over, locked out of their accounts, and having difficulty resetting accounts to regain access

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

Insights

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

In the Redefining Cybersecurity: Bridging the Communication Gap blog, we discussed resources and tools that can help open a dialogue with decision-makers. One of the resources is a Buyer’s Guide which was created by DefenseStorm as a vendor-neutral tool to help financial institutions (FIs) efficiently shop around for new solutions.

PSA – Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Threat Alerts

PSA – Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Internal communication applications, IE: Slack, MS Teams, etc.  Criminals are establishing domains that appear to be from legitimate technical support entities and then attempting to reach out to individuals to gain access to target users’ devices.  The below article was authored by Microsoft Threat Intelligence and taken from Microsoft directly and provides additional detail and threat actor attribution for these types of attacks.

The Role of Governance and Risk Assessment in Cybersecurity Success

Webinars & Videos

The Role of Governance and Risk Assessment in Cybersecurity Success

As the financial sector continues to embrace digital transformation, threat actors remain poised to exploit every vulnerability exposed. The ever-evolving threat landscape elicits a proactive cyber risk management solution that can pivot to address emerging threats as they materialize, and credit unions are faced with mounting pressure to prove their ability to prevent, detect, and mitigate those threats. Despite the many unique challenges and requirements in cyber risk management, credit unions can succeed in cybersecurity by establishing effective governance and utilizing risk assessments.

Redefining Cybersecurity Part 3:  Bridging the Communication Gap

Insights

Redefining Cybersecurity Part 3: Bridging the Communication Gap

An effective cyber risk management strategy requires everyone within the FI to work together with a unified goal for budget allocation and solution implementation.

You Play Like You Practice: Preparedness for Cyber Incidents

Insights

You Play Like You Practice: Preparedness for Cyber Incidents

Military, law enforcement, and first responders train constantly to be prepared for anything that they may face during their careers, so when those particular situations arise, they are confident, efficient, and knowledgeable about how to deal with and resolve the incident.  Incident response in cybersecurity is no different.

Redefining Cybersecurity Part 2: Cyber Risk Readiness

Insights

Redefining Cybersecurity Part 2: Cyber Risk Readiness

With a deeper understanding of this shift in ideology from reactive to proactive solutions, the question arises about your financial institution’s (FI’s) level of cyber risk readiness.

MOVEit Critical Transfer Vulnerability

Threat Alerts

MOVEit Critical Transfer Vulnerability

Earlier in June DefenseStorm became aware of a  vulnerability disclosure involving MOVEit and posted an article.  The casualty list for this vulnerability is growing by the day largely due to exploitation by the Clop Ransomware gang of unpatched instances.

This is an update and reminder to please stay updated on patching and patch for the MOVEit vulnerabilities as soon as possible.

Redefining Cybersecurity Part 1: Cyber Risk Management

Insights

Redefining Cybersecurity Part 1: Cyber Risk Management

In this series, Redefining Cybersecurity, we will walk your FI through the process of evaluating your current state of cyber risk readiness so you can employ more efficient solutions to stay threat ready and compliant.

Malware – Anatsa Banking Trojan for Android

Threat Alerts

Malware – Anatsa Banking Trojan for Android

Since March of 2023 a new mobile malware has been pushing the Android banking trojan “Anatsa” to online banking customers located in the United States, United Kingdom, Austria, Switzerland and Germany. It has since become one of the most prolific banking malware, targeting over 400 financial institutions across the world.

DefenseStorm Security Intel Bulletin

eBooks & Reports

DefenseStorm Security Intel Bulletin

DefenseStorm’s Security Intel Bulletin keeps you up-to-date with the latest and most important cyber risk news for financial institutions. Our experts work hard to find vital industry news published by the most reputable sources, so you can stay informed and threat ready.

Cyber Risk Management Buyers Guide

eBooks & Reports

Cyber Risk Management Buyers Guide

Gain Understanding, Alignment & Action Across Your Financial Institution. The Cyber Risk Management Buyer’s Guide and Workbook provide you with vital information so your FI can take charge of discussions with vendors and effectively secure the best solution to stay threat ready and maintain compliance while optimizing your budget. Plus, when you download the Buyer’s Guide, you get immediate access to the corresponding Buyer’s Guide Workbook, which allows you to compare technologies and services from various vendors.
DefenseStorm Fraud Fusion Center Roundtable

Webinars & Videos

DefenseStorm Fraud Fusion Center Roundtable

Fraud Fusion Centers are being touted as the new, optimal strategy in the fight against fraud with collaboration from different departments who gather to share resources, technology, expertise, and data from different sectors to combat fraud effectively and proactively. As an industry leader in cybersecurity, DefenseStorm participates in peer-to-peer sharing to keep our clients informed and threat ready. Join us for the DefenseStorm Fraud Fusion Center, where experts gather in a round table discussion to share the most important and up-to-date information on cyber fraud trends, threats, best practices, and technology.
Making the Case for Proactive Cyber Fraud Detection

Webinars & Videos

Making the Case for Proactive Cyber Fraud Detection

Learn about the circumstances and challenges that impacted Live Oak Bank, and why they sought out a new approach to cyber fraud detection. Erin Armstrong from Live Oak Bank, along with Adam Barrett and Eric Miller from DefenseStorm share their insights.

Fraud Detection

Datasheets

Fraud Detection

Fraud Detection provides a proactive approach to stop fraud before funds ever leave your financial institution with active threat detection that correlates information from your network, online banking platform, core, and the dark web providing real-time alerts and intervention.

Threat Surveillance

Datasheets

Threat Surveillance

DefenseStorm GRID Active Threat Surveillance gathers and analyzes data from all types of sources, technology, tools, systems to determine if you need to be concerned about happenings in your environment.

Cyber Risk Management Solution

Datasheets

Cyber Risk Management Solution

With cybercrime rapidly evolving, financial institutions must be prepared to address emerging threats as they materialize. Learn about how this proactive approach can improve your level of cyber risk posture and how DefenseStorm’s products and services help you achieve cyber risk readiness.

Vulnerability – Fortinet Releases Security Updates for FortiOS and FortiProxy

Threat Alerts

Vulnerability – Fortinet Releases Security Updates for FortiOS and FortiProxy

On June 12, 2023, a critical Remote Code Execution (RCE) vulnerability was discovered in Fortinet’s popular FortiGate firewalls, posing a significant security risk for organizations relying on these devices for network protection. The vulnerability, identified as a critical flaw, could potentially allow malicious actors to execute arbitrary code on affected FortiGate firewalls.

Barracuda Email Security Gateway Application (ESG) Vulnerability- CVE-2023-2868

Threat Alerts

Barracuda Email Security Gateway Application (ESG) Vulnerability- CVE-2023-2868

Defensestorm is aware of the recent disclosure of the Barracuda Email Security Gateway Application (ESG) Vulnerability and has been actively monitoring for potential Indications of Compromise. 

Fighting Fraud Webinar: The Role of Fraud Fusion Centers

Webinars & Videos

Fighting Fraud Webinar: The Role of Fraud Fusion Centers

Fraud Fusion Center are being utilized across the industry to stay ahead of Fraudsters. Join Adam Barrett and Randy Salser and learn how to join a Fraud Fusion Center and become more proactive against fraud.

Tips for Handling Endpoint Attacks

Insights

Tips for Handling Endpoint Attacks

By following a well-established response plan, organizations can help ensure the confidentiality and integrity of their systems and data.

Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

Insights

Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

With a resolute effort to unite against the threat of cyber fraud, Fraud Fusion Centers are being embraced across all industries to effectively combat cyber fraud.