Amol Sarwate heads Fidelis and CloudPassage worldwide threat and security research lab responsible for Network, Endpoint and Cloud. He has devoted his career to protecting, securing, and educating... Read More
What do VMware, Atlassian Bitbucket, and a song by Janet Jackson have in common?
If you guessed, “They are part of this month’s threat research findings,” you would be right. We’ll give our cyber adversaries credit—they certainly are creative in their attempts to break our operating environments! And no industry is spared from the relentless and ever-changing war waged by attackers.
In this most recent Threat Intelligence Summary, you’ll learn how to identify and mitigate the most critical emerging vulnerabilities and malware. You’ll also gain insight into how malware attacks differ by industry. And you’ll get a glimpse into the difference Fidelis Cybersecurity makes for our customers by keeping them ahead of emerging threats.
Read the August/September 2022 Threat Intelligence Summary
The Fidelis Cybersecurity threat research team’s top ten list this month includes vulnerabilities that, when exploited, can lead to remote code execution, command injection, privilege escalation, and more. You’ll also see one vulnerability that leads to a hard drive crash in the most peculiar way. Each vulnerability listed contains details about the type of exploits possible, along with links so you can track industry findings, active exploits, and mitigation strategies.
No industry is safe from malware attempts and attacks. However, it is interesting to see which malware adversaries use against specific industries. Keeping up with the most common attacks against your industry can help you in the fight against malware. This most recent report, our Threat Research Team (TRT) compiled a list of charts so you can see the top attacks by industry. Of course, there are also many more, less utilized tactics. Rest assured, the Fidelis Cybersecurity TRT tracks them all!
The Threat Research team at Fidelis Cybersecurity researches and analyzes the latest threats and issues. The intelligence we gather from multiple open-source and proprietary sources about our cyber adversaries’ tactics, techniques, and procedures (TTPs) is fed directly into our platforms, products, and services to help our customers detect, neutralize, and eliminate threats before they can harm production systems.
Visit the Fidelis Cybersecurity Threat Research page to read the complete August/September 2022 Threat Intelligence Summary, along with information on critical threats and resources to help you better prepare for the next attack.