DEFENSESTORM

Cybersecurity RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These cybersecurity resources highlight our recent research and success stories.

Cyber security risk management solutions from DefenseStorm.
M365 Password Spraying Attack via Botnet

Threat Alerts

M365 Password Spraying Attack via Botnet

Microsoft 365 accounts are facing an extensive password spraying attack by a Chinese botnet, which possesses the ability to bypass multifactor authentication (MFA). This botnet comprises over 130,000 compromised devices, utilizing stolen credentials from infostealer accounts and then systematically attempting to log into M365 accounts globally.

Lazarus Group’s LinkedIn Job Offer Scam Exposed

Insights

Lazarus Group’s LinkedIn Job Offer Scam Exposed

With recruiters using LinkedIn as a very popular way to research and reach out to potential candidates, bad actors have begun to try to abuse people’s trust and desire for new challenges to lure them in with fake job opportunities as a way capture their credentials and deliver additional malware.

Tax Season IRS Tips for Scams

Insights

Tax Season IRS Tips for Scams

The IRS has already made several reminders for individuals to be aware of bad actors trying to take advantage of this season to gain access to your personal data and finances. Read tips and guidance taken directly from the IRS’ website, including associated links to stay safe during tax season.

NIST Framework Password Recommendations

Insights

NIST Framework Password Recommendations

Take a minute and think about the password(s) you use in both your professional and personal capacities. When passwords are reused or weak, they are far more susceptible to being stolen. One stolen password can lead to a detrimental data breach for your organization.

Post-FFIEC Cybersecurity: Strategies for Stronger Defense

Insights

Post-FFIEC Cybersecurity: Strategies for Stronger Defense

To prepare for the FFIEC Cybersecurity Assessment Tool sunset date, financial institutions should identify a new framework around which to build their programs and self-assess themselves against that framework using a risk based approach to ascertain that the appropriate level of maturity is reached within various areas.

Black Friday & Cyber Monday: Rising Cyber Risks

Threat Alerts

Black Friday & Cyber Monday: Rising Cyber Risks

As the excitement of Black Friday and Cyber Monday draws shoppers in with unbeatable deals and discounts, it’s important to remember that the online shopping frenzy also brings increased cybersecurity risks.

Remote Access Tools: Friend or Foe?

Insights

Remote Access Tools: Friend or Foe?

With the remote workforce not showing any signs of slowing down, many organizations are starting to evaluate and implement ways to access these systems through the usage of Remote Access Tools. While these tools provide an incredible amount of value to an organization to stay connected and retain access, Remote Access Tools are a significant attack vector in cybersecurity and are something that should not be taken lightly.

KnowBe4 Security Awareness and Training

Datasheets

KnowBe4 Security Awareness and Training

DefenseStorm provides KnowBe4 as an add-on service with the goal of improving security awareness among employees and, as a result, strengthening your human firewall. KB4 is the world’s largest integrated platform for security awareness training and simulated phishing. It addresses the critical threat of social engineering by educating employees on how to identify and respond to cybersecurity threats.

Online Brand Protection From Allure Security

Datasheets

Online Brand Protection From Allure Security

Strengthen your proactive cybersecurity, fraud prevention and threat visibility strategy using a layered, full cycle approach with DefenseStorm and Allure Security.

Rodney Hood emphasizes the importance of enhancing risk management practices

Webinars & Videos

Rodney Hood emphasizes the importance of enhancing risk management practices

DefenseStorm Board member and former chairman of the NCUA, Rodney Hood emphasizes the importance of enhancing risk management practices for financial institutions, urging them to extend their risk disciplines to cybersecurity and information security. He highlights the necessity of conducting thorough risk assessments in-house, defining risk appetite, and establishing meaningful metrics to foster effective governance and prepare for evolving risks.

CISA Warns of Hurricane-Related Scams

Threat Alerts

CISA Warns of Hurricane-Related Scams

CISA is alerting the public to be cautious of potential cyber scams following hurricanes. After major natural disasters, fraudulent emails and social media messages—often containing harmful links or attachments—are common.

Cyber Risk Readiness Action Dashboard LIVE in GRID Active

Insights

Cyber Risk Readiness Action Dashboard LIVE in GRID Active

Announcing the NEW GRID Active Cyber Risk Readiness Action Dashboard.  The additions to DefenseStorm’s Cyber Security Risk Management platform delivers customers with an overview and actionable steps to stay ready against cyber attacks

DefenseStorm Tabletops

Datasheets

DefenseStorm Tabletops

Tabletop exercises are valuable for financial institutions (FI) striving to maintain operational resilience and regulatory compliance. By regularly conducting them, FIs can ensure that they are well-prepared to navigate the complexities and uncertainties of the financial landscape. DefenseStorm Tabletops are simulation exercises used to test and improve the preparedness and response capabilities of an organization to various scenarios. 

Cybersecurity Assessment Tool (CAT) Sunset Announcement

Insights

Cybersecurity Assessment Tool (CAT) Sunset Announcement

The Federal Financial Institutions Examination Council (FFIEC) released important information surrounding the commonly used Cybersecurity Assessment Tool (CAT).

Georgia’s Own Credit Union

Case Studies

Georgia’s Own Credit Union

With over $4B in assets, Georgia’s Own Credit Union serves nearly 240,000 members across 37 offices. Georgia’s Own CU originally signed with DefenseStorm in 2021 and continues to work in partnership to maintain a robust cyber risk management program.

Peach State Bank and Trust Testimonial

Case Studies

Peach State Bank and Trust Testimonial

Peach State Bank and Trust has been a long-term, valued client of DefenseStorm since 2016, when the two companies first partnered. John Chapman, Information Security Officer at Peach State Bank and Trust sat with DefenseStorm during the 2023 Client Appreciation Event to discuss the importance of cybersecurity for their financial institution and the benefits of partnering with DefenseStorm.

Endpoint Detection and Response (EDR)

Datasheets

Endpoint Detection and Response (EDR)

Threat detection is the number one priority for cybersecurity teams. If you don’t see the bad actors in your network, you can’t respond appropriately. Learn how DefenseStorm EDR uses a mix of technology and expertise to continuously look for threats.

A Regional Bank in the Midwest Improves Cyber Risk Readiness with DefenseStorm

Case Studies

A Regional Bank in the Midwest Improves Cyber Risk Readiness with DefenseStorm

A regional bank in the Midwest was functioning with two prime challenges. First, they had various different systems with which they managed risk – from risk assessments in one platform to managing network detection tools in another to different platforms for endpoint antivirus. The second issue and what motivated them to begin seeking another cyber risk management solution was that their current vendor for managed detection and response had lost the “personal touch” they desired.

Listerhill Testimonial

Case Studies

Listerhill Testimonial

Listerhill Credit Union is guided by core values that include prioritization of safety and soundness in cybersecurity. Listerhill CU’s VP of Network Administration and Information Security Officer sat for an interview with DefenseStorm during the 2023 Client Appreciation Event to express their confidence in the ability to rely on a partner like DefenseStorm.

What to Know about the NPD Breach

Threat Alerts

What to Know about the NPD Breach

In April 2024, a known threat actor calling themselves USDoD claimed to possess and sell approximately 2.9 billion records from National Public Data, which included individuals’ personal data from people in the US, UK, and Canada.

AT&T Unlawful Access of Customer Data Incident

Threat Alerts

AT&T Unlawful Access of Customer Data Incident

News is emerging about AT&T’s disclosure of what they term as ‘Unlawful Access of Customer Data.’  The majority of AT&T customer data was illegally downloaded from their workspace on a third-party cloud platform from May 2022 through October 31, 2022 and on January 2, 2023.

Cyber Risk Readiness in GRID Active

Insights

Cyber Risk Readiness in GRID Active

GRID Active now offers customer a view into their state of Cyber Risk Readiness and demonstrates the positive impact an integrated cyber risk management platform can have in managing cyber risk.

Evolve Bank and Trust Breach

Threat Alerts

Evolve Bank and Trust Breach

In late June 2024, LockBit cybercriminal group claimed responsibility for having breached a government agency with plans to release the stolen data. It was revealed that the group actually breached Evolve Bank and Trust.

GRID Active Reporting

Datasheets

GRID Active Reporting

GRID Active Reporting enables financial institutions to exercise informed decision-making through consistent metrics and ensures confidence in the execution of their cyber risk management program and strategic objectives.

Risk Assessment and Governance Package

Datasheets

Risk Assessment and Governance Package

DefenseStorm offers the only built for banking cyber risk management  solution tailored to the unique needs of financial institutions while aligning risk management and governance.

Creating a Proactive Cybersecurity Risk Management Plan

Insights

Creating a Proactive Cybersecurity Risk Management Plan

Cybersecurity risk management is a critical component of risk for banks and credit unions and by taking a proactive approach to risk, you can identify, mitigate, and even prevent risk before it’s too late. Learn how DefenseStorm’s built for banking approach can help you tackle cybersecurity risk and keep your institution cyber risk ready.

Cybercriminals Love the Olympics Too, but for Different Reasons.

Insights

Cybercriminals Love the Olympics Too, but for Different Reasons.

The Olympic Games begin July 26, 2024, and end August 11, 2024. I, like most people around the globe, will be watching and cheering on our nation’s athletes as they achieve their goals and live out their Olympic dreams. Unlike most of the audience, though, I will also be thinking about the unseen but expected threats and attacks that will be occurring from cybercriminals and bad threat actors taking advantage of such a major event.

Cybersecurity Risk 2024: Keeping Pace with Evolving Standards

Insights

Cybersecurity Risk 2024: Keeping Pace with Evolving Standards

A proposed rule from the Federal Deposit Insurance Corporation (FDIC) will establish new regulatory standards and increase the focus of cybersecurity risk management and governance while bringing an expectation of faster response times and real-time remediation of deficiencies.

Everything You Need to Know About the Alleged AT&T Data Leak

Threat Alerts

Everything You Need to Know About the Alleged AT&T Data Leak

Reports of a massive AT&T data leak have surfaced, with around seventy million customers potentially affected. The data is reportedly for sale on a leak forum or website.

New Guidance for Managing Cybersecurity Risks with NIST CSF 2.0

Insights

New Guidance for Managing Cybersecurity Risks with NIST CSF 2.0

NIST’s Cybersecurity Framework (CSF) is designed to help institutions of all sizes and sophistication levels manage and reduce their unique cybersecurity risks. With the release of CSF 2.0, the guidance provided by NIST has expanded the practice and controls that institutions can use to best understand, assess, prioritize, and communicate its cybersecurity efforts.