DEFENSESTORM
Thought leadership and customer testimonials are some of the many ways we build a community of trust. These cybersecurity resources highlight our recent research and success stories.


Threat Alerts
Microsoft 365 accounts are facing an extensive password spraying attack by a Chinese botnet, which possesses the ability to bypass multifactor authentication (MFA). This botnet comprises over 130,000 compromised devices, utilizing stolen credentials from infostealer accounts and then systematically attempting to log into M365 accounts globally.

Insights
With recruiters using LinkedIn as a very popular way to research and reach out to potential candidates, bad actors have begun to try to abuse people’s trust and desire for new challenges to lure them in with fake job opportunities as a way capture their credentials and deliver additional malware.

Insights
The IRS has already made several reminders for individuals to be aware of bad actors trying to take advantage of this season to gain access to your personal data and finances. Read tips and guidance taken directly from the IRS’ website, including associated links to stay safe during tax season.

Insights
Take a minute and think about the password(s) you use in both your professional and personal capacities. When passwords are reused or weak, they are far more susceptible to being stolen. One stolen password can lead to a detrimental data breach for your organization.

Insights
To prepare for the FFIEC Cybersecurity Assessment Tool sunset date, financial institutions should identify a new framework around which to build their programs and self-assess themselves against that framework using a risk based approach to ascertain that the appropriate level of maturity is reached within various areas.

Threat Alerts
As the excitement of Black Friday and Cyber Monday draws shoppers in with unbeatable deals and discounts, it’s important to remember that the online shopping frenzy also brings increased cybersecurity risks.

Insights
With the remote workforce not showing any signs of slowing down, many organizations are starting to evaluate and implement ways to access these systems through the usage of Remote Access Tools. While these tools provide an incredible amount of value to an organization to stay connected and retain access, Remote Access Tools are a significant attack vector in cybersecurity and are something that should not be taken lightly.

Datasheets
DefenseStorm provides KnowBe4 as an add-on service with the goal of improving security awareness among employees and, as a result, strengthening your human firewall. KB4 is the world’s largest integrated platform for security awareness training and simulated phishing. It addresses the critical threat of social engineering by educating employees on how to identify and respond to cybersecurity threats.

Datasheets
Strengthen your proactive cybersecurity, fraud prevention and threat visibility strategy using a layered, full cycle approach with DefenseStorm and Allure Security.

Webinars & Videos
DefenseStorm Board member and former chairman of the NCUA, Rodney Hood emphasizes the importance of enhancing risk management practices for financial institutions, urging them to extend their risk disciplines to cybersecurity and information security. He highlights the necessity of conducting thorough risk assessments in-house, defining risk appetite, and establishing meaningful metrics to foster effective governance and prepare for evolving risks.

Threat Alerts
CISA is alerting the public to be cautious of potential cyber scams following hurricanes. After major natural disasters, fraudulent emails and social media messages—often containing harmful links or attachments—are common.

Insights
Announcing the NEW GRID Active Cyber Risk Readiness Action Dashboard. The additions to DefenseStorm’s Cyber Security Risk Management platform delivers customers with an overview and actionable steps to stay ready against cyber attacks

Datasheets
Tabletop exercises are valuable for financial institutions (FI) striving to maintain operational resilience and regulatory compliance. By regularly conducting them, FIs can ensure that they are well-prepared to navigate the complexities and uncertainties of the financial landscape. DefenseStorm Tabletops are simulation exercises used to test and improve the preparedness and response capabilities of an organization to various scenarios.
Insights
The Federal Financial Institutions Examination Council (FFIEC) released important information surrounding the commonly used Cybersecurity Assessment Tool (CAT).

Case Studies
With over $4B in assets, Georgia’s Own Credit Union serves nearly 240,000 members across 37 offices. Georgia’s Own CU originally signed with DefenseStorm in 2021 and continues to work in partnership to maintain a robust cyber risk management program.

Case Studies
Peach State Bank and Trust has been a long-term, valued client of DefenseStorm since 2016, when the two companies first partnered. John Chapman, Information Security Officer at Peach State Bank and Trust sat with DefenseStorm during the 2023 Client Appreciation Event to discuss the importance of cybersecurity for their financial institution and the benefits of partnering with DefenseStorm.

Datasheets
Threat detection is the number one priority for cybersecurity teams. If you don’t see the bad actors in your network, you can’t respond appropriately. Learn how DefenseStorm EDR uses a mix of technology and expertise to continuously look for threats.

Case Studies
A regional bank in the Midwest was functioning with two prime challenges. First, they had various different systems with which they managed risk – from risk assessments in one platform to managing network detection tools in another to different platforms for endpoint antivirus. The second issue and what motivated them to begin seeking another cyber risk management solution was that their current vendor for managed detection and response had lost the “personal touch” they desired.

Case Studies
Listerhill Credit Union is guided by core values that include prioritization of safety and soundness in cybersecurity. Listerhill CU’s VP of Network Administration and Information Security Officer sat for an interview with DefenseStorm during the 2023 Client Appreciation Event to express their confidence in the ability to rely on a partner like DefenseStorm.

Threat Alerts
In April 2024, a known threat actor calling themselves USDoD claimed to possess and sell approximately 2.9 billion records from National Public Data, which included individuals’ personal data from people in the US, UK, and Canada.

Threat Alerts
News is emerging about AT&T’s disclosure of what they term as ‘Unlawful Access of Customer Data.’ The majority of AT&T customer data was illegally downloaded from their workspace on a third-party cloud platform from May 2022 through October 31, 2022 and on January 2, 2023.

Insights
GRID Active now offers customer a view into their state of Cyber Risk Readiness and demonstrates the positive impact an integrated cyber risk management platform can have in managing cyber risk.

Threat Alerts
In late June 2024, LockBit cybercriminal group claimed responsibility for having breached a government agency with plans to release the stolen data. It was revealed that the group actually breached Evolve Bank and Trust.

Datasheets
GRID Active Reporting enables financial institutions to exercise informed decision-making through consistent metrics and ensures confidence in the execution of their cyber risk management program and strategic objectives.

Datasheets
DefenseStorm offers the only built for banking cyber risk management solution tailored to the unique needs of financial institutions while aligning risk management and governance.

Insights
Cybersecurity risk management is a critical component of risk for banks and credit unions and by taking a proactive approach to risk, you can identify, mitigate, and even prevent risk before it’s too late. Learn how DefenseStorm’s built for banking approach can help you tackle cybersecurity risk and keep your institution cyber risk ready.

Insights
The Olympic Games begin July 26, 2024, and end August 11, 2024. I, like most people around the globe, will be watching and cheering on our nation’s athletes as they achieve their goals and live out their Olympic dreams. Unlike most of the audience, though, I will also be thinking about the unseen but expected threats and attacks that will be occurring from cybercriminals and bad threat actors taking advantage of such a major event.

Insights
A proposed rule from the Federal Deposit Insurance Corporation (FDIC) will establish new regulatory standards and increase the focus of cybersecurity risk management and governance while bringing an expectation of faster response times and real-time remediation of deficiencies.

Threat Alerts
Reports of a massive AT&T data leak have surfaced, with around seventy million customers potentially affected. The data is reportedly for sale on a leak forum or website.

Insights
NIST’s Cybersecurity Framework (CSF) is designed to help institutions of all sizes and sophistication levels manage and reduce their unique cybersecurity risks. With the release of CSF 2.0, the guidance provided by NIST has expanded the practice and controls that institutions can use to best understand, assess, prioritize, and communicate its cybersecurity efforts.