Warning: ini_set(): Session ini settings cannot be changed when a session is active in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 12

Warning: Trying to access array offset on value of type null in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1071

Warning: Trying to access array offset on value of type null in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1072

Warning: Undefined array key 1 in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1105

Warning: Undefined array key 2 in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1105

Warning: Undefined array key 3 in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1105

Warning: Undefined array key 4 in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1105

Warning: Undefined array key 5 in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1105

Warning: Undefined variable $link_subfolder1 in /home/u319666691/domains/cybersecurityboard.com/public_html/index.php on line 1134

Warning: Undefined variable $meta_article in /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php on line 100

Warning: Undefined variable $meta_og in /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php on line 100

Warning: Undefined variable $meta_twitter in /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php on line 100

Warning: Undefined variable $login_loggedon_html in /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php on line 142
Recommendations that defenders can use from Talos' Year in Review Report | CyberSecurityBoard

Warning: Undefined variable $comments_html in /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php on line 527

Recommendations that defenders can use from Talos' Year in Review Report

The Talos Year in Review is available now and contains a wealth of insights about how the threat landscape has shifted in 2023.
With new ransomware strains emerging from leaked source code, commodity loaders adding more reconnaissance measures to their belts, and geopolitical events influencing APT activity, there's a lot to dissect.
Even if the defender community dismantles a botnet, like for example the takedown of Qakbot in August, it doesn't mean the group behind it will cease to operate.
Knowing what risks you can accept, and what risks you absolutely can't.
As we at Talos commonly say, whomever knows the network best, owns the network.
Veradigm, a healthcare IT organization that the Cisco Talos Incident Response team has been working alongside for many years to proactively assess and constantly improve their security posture, recently detected an intrusion and potential information-stealing attack.
Luckily, their preparedness coupled with their Talos IR partnership enabled them to swiftly pinpoint the issues before bad actors could execute their plan.
Veradigm has also participated in multiple Talos IR tabletop exercises to stress test processes and adjust as needed to respond and succeed more quickly.
Aligned to that, experts from across Cisco recently sat down to discuss proactive threat hunting in general, and the benefits this type of activity can have to help organizations find vulnerabilities and weak points that hadn't been spotted before.
One of the newer cross-regional trends we observed this year is an increase in the targeting of network devices, from both APTs and cybercriminals.
The intent can differ between these disparate adversaries: the former is more driven by espionage and secondary target selection while the latter aims more for financial gain.
Both groups rely on exploiting recently disclosed vulnerabilities as well as weak/default credentials.
This is one of the reasons why use of valid accounts was a top MITRE ATT&CK technique observed this year, and consistently a top weakness in Talos Incident Response engagements.
Patching isn't easy, and isn't necessarily without risk.
We got a question on the Reddit AMA thread that we ran earlier this week, about the difficulties of patching network infrastructure.
I thought my colleague's response was such a good one I wanted to highlighted it here.
MFA really is one of the best things you can do to limit your threat surface.
In this episode of the Talos Takes podcast, we address the basics of implementing MFA in any environment, why any type of MFA is better than no MFA, the pitfalls of certain types of authentication, and whether going passwordless is the future.


This Cyber News was published on blog.talosintelligence.com. Publication date: Thu, 14 Dec 2023 12:43:04 +0000


Cyber News related to Recommendations that defenders can use from Talos' Year in Review Report


Fatal error: Uncaught mysqli_sql_exception: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'Year in Review Report') AS score FROM TPL_articles WHERE urlarray1_seo!='page...' at line 1 in /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php:336 Stack trace: #0 /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php(336): mysqli_query() #1 /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php(548): template_block() #2 /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php(531): template_related() #3 /home/u319666691/domains/cybersecurityboard.com/public_html/index.php(1135): template_content() #4 {main} thrown in /home/u319666691/domains/cybersecurityboard.com/public_html/_template.php on line 336