DEFENSESTORM

Cyber Security RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These cyber security resources highlight our recent research and success stories.

Cyber security risk management solutions from DefenseStorm.
PSA – CISA Warns of Hurricane Related Scams

Threat Alerts

PSA – CISA Warns of Hurricane Related Scams

With the recent natural disasters that have occurred, it’s important to be aware that bad actors will attempt to leverage those devasting incidents for gain.  CISA has released a warning urging users to be aware of malicious activity when these types of incidents occur.  Please read the below alert from CISA.

Redefining Cybersecurity Part 5: Cyber Risk Awareness

Insights

Redefining Cybersecurity Part 5: Cyber Risk Awareness

In the final installment of our Redefining Cybersecurity series, we explore Cyber Risk Awareness. While the deployment of new technology is critical to ensuring cyber risk readiness, a lack of training and awareness is a significant liability to any institution.

The Impact of AI on Cybersecurity Part 1: The Role it Plays

Insights

The Impact of AI on Cybersecurity Part 1: The Role it Plays

The role of AI on cybersecurity is tremendous. AI is transforming daily business practices and enhancing the customer experience for most industries, but it is imperative to effectively balance technological advancement with close oversight while these technologies are rolled out.

Life Savings Lost to a Bank Scam

Fraud Squad

Life Savings Lost to a Bank Scam

A small business owner recently fell victim to a sophisticated bank scam that drained her life savings, where scammers exploited two-factor authentication to gain access and withdraw money from her account. This cautionary story serves as a warning about the increasing prevalence of fraud and emphasizes the significance of using effective fraud detection systems.

NCUA Cyber Incident Notification Requirements

Insights

NCUA Cyber Incident Notification Requirements

NCUA Cyber Incident Notifications Requirement goes into effect September 1, 2023.  The final rule requires that covered institutions notify the NCUA as soon as possible, and no later than 72 hours, after the credit union reasonably believes it has experienced a reportable cyber incident or received a notification from a third party regarding a reportable cyber incident.

Possible LinkedIn Account Hijacking Campaign

Threat Alerts

Possible LinkedIn Account Hijacking Campaign

While nothing official has been published by LinkedIn at the time of this post, accounts on the platform appear to be coming under attack in some type of hacking campaign of unknown origin.  Users are reporting on multiple other outlets that their accounts have been taken over, locked out of their accounts, and having difficulty resetting accounts to regain access

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

Insights

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

Part 4 of our Redefining Cyber Security series explores the power of a buyer’s guide, a vendor-neutral tool created by DefenseStorm to help FIs efficiently shop for new cyber security risk management solutions.

PSA – Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Threat Alerts

PSA – Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Internal communication applications, IE: Slack, MS Teams, etc.  Criminals are establishing domains that appear to be from legitimate technical support entities and then attempting to reach out to individuals to gain access to target users’ devices.  The below article was authored by Microsoft Threat Intelligence and taken from Microsoft directly and provides additional detail and threat actor attribution for these types of attacks.

The Role of Governance and Risk Assessment in Cybersecurity Success

Webinars & Videos

The Role of Governance and Risk Assessment in Cybersecurity Success

As the financial sector continues to embrace digital transformation, threat actors remain poised to exploit every vulnerability exposed. The ever-evolving threat landscape elicits a proactive cyber risk management solution that can pivot to address emerging threats as they materialize, and credit unions are faced with mounting pressure to prove their ability to prevent, detect, and mitigate those threats. Despite the many unique challenges and requirements in cyber risk management, credit unions can succeed in cybersecurity by establishing effective governance and utilizing risk assessments.

Redefining Cybersecurity Risk Management Part 3: Bridging the Communication Gap

Insights

Redefining Cybersecurity Risk Management Part 3: Bridging the Communication Gap

An effective cyber risk management strategy requires everyone within the FI to work together with a unified goal for budget allocation and solution implementation.

You Play Like You Practice: Cyber Incident Response

Insights

You Play Like You Practice: Cyber Incident Response

Military, law enforcement, and first responders train constantly to be prepared for anything that they may face during their careers, so when those particular situations arise, they are confident, efficient, and knowledgeable about how to deal with and resolve the incident. Cyber incident response is no different.

Redefining Cybersecurity Part 2: Cyber Security Risk Readiness

Insights

Redefining Cybersecurity Part 2: Cyber Security Risk Readiness

With a deeper understanding of this shift in ideology from reactive to proactive solutions, the question arises about your financial institution’s (FI’s) level of cyber security risk readiness.

MOVEit Critical Transfer Vulnerability

Threat Alerts

MOVEit Critical Transfer Vulnerability

Earlier in June DefenseStorm became aware of a  vulnerability disclosure involving MOVEit and posted an article.  The casualty list for this vulnerability is growing by the day largely due to exploitation by the Clop Ransomware gang of unpatched instances.

This is an update and reminder to please stay updated on patching and patch for the MOVEit vulnerabilities as soon as possible.

Redefining Cybersecurity Part 1: Cybersecurity and Risk Management

Insights

Redefining Cybersecurity Part 1: Cybersecurity and Risk Management

In this 5 part series, Redefining Cybersecurity, we will walk your FI through the process of evaluating your current state of cybersecurity and risk management so you can employ more efficient solutions to stay threat ready and compliant.

Malware – Anatsa Banking Trojan for Android

Threat Alerts

Malware – Anatsa Banking Trojan for Android

Since March of 2023 a new mobile malware has been pushing the Android banking trojan “Anatsa” to online banking customers located in the United States, United Kingdom, Austria, Switzerland and Germany. It has since become one of the most prolific banking malware, targeting over 400 financial institutions across the world.

DefenseStorm Security Intel Bulletin

eBooks & Reports

DefenseStorm Security Intel Bulletin

DefenseStorm’s Security Intel Bulletin keeps you up-to-date with the latest and most important cyber risk news for financial institutions. Our experts work hard to find vital industry news published by the most reputable sources, so you can stay informed and threat ready.

Cyber Risk Management Buyers Guide

eBooks & Reports

Cyber Risk Management Buyers Guide

Gain Understanding, Alignment & Action Across Your Financial Institution. The Cyber Risk Management Buyer’s Guide and Workbook provide you with vital information so your FI can take charge of discussions with vendors and effectively secure the best solution to stay threat ready and maintain compliance while optimizing your budget. Plus, when you download the Buyer’s Guide, you get immediate access to the corresponding Buyer’s Guide Workbook, which allows you to compare technologies and services from various vendors.
DefenseStorm Fraud Fusion Center Roundtable

Webinars & Videos

DefenseStorm Fraud Fusion Center Roundtable

Fraud Fusion Centers are being touted as the new, optimal strategy in the fight against fraud with collaboration from different departments who gather to share resources, technology, expertise, and data from different sectors to combat fraud effectively and proactively. As an industry leader in cybersecurity, DefenseStorm participates in peer-to-peer sharing to keep our clients informed and threat ready. Join us for the DefenseStorm Fraud Fusion Center, where experts gather in a round table discussion to share the most important and up-to-date information on cyber fraud trends, threats, best practices, and technology.
Making the Case for Proactive Cyber Fraud Prevention

Webinars & Videos

Making the Case for Proactive Cyber Fraud Prevention

Learn about the circumstances and challenges that impacted Live Oak Bank, and why they sought out a new approach to prevent cyber fraud. Erin Armstrong from Live Oak Bank, along with Adam Barrett and Eric Miller from DefenseStorm share their insights.

GRID Active Fraud Prevention

Datasheets

GRID Active Fraud Prevention

Account Holder Fraud Prevention provides a proactive approach to stop fraud before funds ever leave your financial institution with active threat detection that correlates information from your network, online banking platform, core, and the dark web providing real-time alerts and intervention.

Threat Surveillance

Datasheets

Threat Surveillance

DefenseStorm GRID Active Threat Surveillance gathers and analyzes data from all types of sources, technology, tools, systems to determine if you need to be concerned about happenings in your environment.

Cyber Risk Management Solution

Datasheets

Cyber Risk Management Solution

With cybercrime rapidly evolving, financial institutions must be prepared to address emerging threats as they materialize. Learn about how this proactive approach can improve your level of cyber risk posture and how DefenseStorm’s products and services help you achieve cyber risk readiness.

Vulnerability – Fortinet Releases Security Updates for FortiOS and FortiProxy

Threat Alerts

Vulnerability – Fortinet Releases Security Updates for FortiOS and FortiProxy

On June 12, 2023, a critical Remote Code Execution (RCE) vulnerability was discovered in Fortinet’s popular FortiGate firewalls, posing a significant security risk for organizations relying on these devices for network protection. The vulnerability, identified as a critical flaw, could potentially allow malicious actors to execute arbitrary code on affected FortiGate firewalls.

Barracuda Email Security Gateway Application (ESG) Vulnerability- CVE-2023-2868

Threat Alerts

Barracuda Email Security Gateway Application (ESG) Vulnerability- CVE-2023-2868

Defensestorm is aware of the recent disclosure of the Barracuda Email Security Gateway Application (ESG) Vulnerability and has been actively monitoring for potential Indications of Compromise. 

Fighting Fraud Webinar: The Role of Fraud Fusion Centers

Webinars & Videos

Fighting Fraud Webinar: The Role of Fraud Fusion Centers

Fraud Fusion Center are being utilized across the industry to stay ahead of Fraudsters. Join Adam Barrett and Randy Salser and learn how to join a Fraud Fusion Center and become more proactive against fraud.

Endpoint Attacks Tips and Best Practices

Insights

Endpoint Attacks Tips and Best Practices

By following a well-established response plan for Endpoint Attacks, organizations can help ensure the confidentiality and integrity of their systems and data.

Future of AI and Cybersecurity: The Power of Partnership

Insights

Future of AI and Cybersecurity: The Power of Partnership

As artificial intelligence (AI) technology enriches various aspects of our lives, a critical question remains regarding whether its capabilities and implications will drive cybersecurity toward success or serve as a catalyst for its downfall.

Incident Monitoring Enhancement: From a Limited to Comprehensive View

Insights

Incident Monitoring Enhancement: From a Limited to Comprehensive View

GRID Active Threat Surveillance now includes an Incident Similarity feature which leverages machine learning to enhance incident monitoring and management.

Governance Program

Datasheets

Governance Program

GRID Active is the only built for banking cyber risk management solution that integrates an institution’s compliance program into that platform.

 

 

Risk Assessment

Datasheets

Risk Assessment

DefenseStorm offers the only built for banking cyber risk management  solution with integrated custom risk assessments.