Mjolnir Security

94 Results / Page 1 of 11

Background

todayNovember 2, 2024

  • 37
close

Cybercrime + Incident Response + News + Cyber security Mjolnir Security

The Cyber Skynet: Unraveling a Sophisticated BEC Campaign Against Credit Unions

In the ever-evolving landscape of cybersecurity, threats have become more sophisticated, more targeted, and more relentless. Recently, Mjolnir Security found itself in the midst of a complex investigation that echoed the tension and urgency of a Terminator movie. Much like Sarah Connor being pursued by an unstoppable force, ten credit ...

News + Crisis Management Mjolnir Security / October 26, 2024

Comprehensive GAP Assessment Services by Mjolnir Security

Bridging the Security Gap with Tailored Compliance Solutions In today’s high-stakes business environment, safeguarding your organization’s assets and reputation is paramount. Mjolnir Security’s GAP Assessment service is specifically designed for executive leaders who recognize the critical importance of robust cybersecurity and compliance. Our service offers a comprehensive evaluation of your ...

todayAugust 2, 2024

  • 165
  • 1
close

Incident Response + Penetration Testing + News + Breach Mjolnir Security

Security Risks of Insecure LDAP Connections

Abstract This research investigates the security risks associated with insecure LDAP connections, particularly in the context of VPN environments. By examining multiple connections over insecure networks such as and similar instances, this research highlights the vulnerabilities and potential exploits. The research delves into the fundamentals of LDAP, its role in ...

Case Study + AI Mjolnir Security / July 7, 2024

Privacy and Security Concerns in AI-Driven Applications: A Comprehensive Overview

Artificial Intelligence (AI) is transforming industries, enhancing capabilities, and offering unprecedented opportunities for innovation. However, as AI-driven applications become more prevalent, they also bring with them significant privacy and security concerns. These concerns arise from the nature of AI technologies, which often require vast amounts of data, complex algorithms, and ...

Case Study + Ransomware Mjolnir Security / July 5, 2024

Case Study: Mjolnir Security’s Intervention in a Ransomware Attack on an ISP

Introduction In late 2023, a prominent Internet Service Provider (ISP) experienced a severe ransomware attack that threatened its operations, financial stability, and reputation. The attack’s origin was traced back to the ISP’s Managed Service Provider (MSP), which had neglected essential security and auditing controls. Despite these deficiencies, the MSP attempted ...

todayMay 30, 2024

  • 703
  • 2
close

News + Malware + Ransomware + Cybercrime + Incident Response Mjolnir Security

BlackSuit Ransomware Group

Background and History BlackSuit ransomware, a rebranded version of the infamous Royal ransomware, emerged in May 2023. This strategic rebranding was an attempt to evade intensified law enforcement scrutiny. Originating from the notorious Conti ransomware gang, BlackSuit quickly targeted high-profile sectors such as healthcare, education, and critical infrastructure, causing widespread ...

todayMay 2, 2024

  • 135
  • 5
close

Breach + News + Malware + Ransomware Mjolnir Security

Unlocking Awareness: Safeguard Your Digital Keys Against INC Ransomware Threats

INC Ransomware is a sophisticated cybercriminal group targeting organizations through complex cyberattacks. Here’s an explanation of their typical attack sequence and tactics designed for a non-technical audience in a business context: The sequence described utilizes various tactics, techniques, and procedures (TTPs) identified in the MITRE ATT&CK framework, which is a ...