Cybercriminals in Australia are getting creative, exploiting niche interests—like Bengal tigers—to bait victims into malware traps. ??Why Bengal tigers? Hackers are smart—they focus on what interests?their target, whether it’s your child’s school project, a hobby, or a trending social media topic. Using insights from Facebook and Instagram, attackers craft highly personalized campaigns to gain trust and manipulate users into clicking malicious links. Once clicked, malware like?GootLoader?silently infiltrates systems, stealing sensitive data, deploying ransomware, and executing advanced attacks. ????Stay Protected:?Adopt a Zero Trust approach, avoid suspicious links, and stay vigilant. ??Learn how to protect your data while using social media: https://lnkd.in/gbYfy9cF
Securin Inc.
计算机和网络安全
Albuquerque,New Mexico 21,232 位关注者
Continuously Improve Your Security Posture
关于我们
Securin is obsessed with helping leaders continuously improve their security posture. We partner with our customers using our tech-enabled services including Attack Surface Management, Vulnerability Management, Pentesting and Vulnerability Intelligence. As a US Department of Homeland Security sponsored CVE number authority, we have deep expertise in offensive pentesting and unique insights into the latest threats. Our capabilities allow us to continuously reduce your attack surface and provide predictive intelligence, so you can stay ahead of the bad actors. At Securin, we work as an extension of your team, providing the glue to create a security fabric that protects your organization.
- 网站
-
https://securin.io
Securin Inc.的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 201-500 人
- 总部
- Albuquerque,New Mexico
- 类型
- 私人持股
- 创立
- 2020
- 领域
- Penetration Testing、Attack Surface Management、Vulnerability Management as a Service、Threat Hunting、Vulnerability Research、Dark web mining、Penetration testing as a service、Red Teaming、Compliance Services、Predictive Early warning和Vulnerability Intelligence
地点
-
主要
US,New Mexico,Albuquerque,87110
Securin Inc.员工
-
Rahul Kannan
President, Go-To-Market Specialist, Board Advisor
-
Gaurav Mehta
Customer Success Leader | SaaS Enthusiast | Driving Cybersecurity Solutions | Empowering Businesses with Technology-Driven Growth
-
Rohini Kasturi
Global C-Suite Executive | Board Member | Stanford & Harvard Alum
-
Macy Dennis
Entrepreneur | Chief Security Officer (CSO) | Defense, Space, Intelligence & Critical Infrastructure Advisor | Startup Board Member | Coach/Mentor |…
动态
-
Anatomy of a threat landscape ?? Securin researchers analyzed 1700 attacks on critical infrastructure in 2024. Spot the pattern… These are the Top 5 threat actors, mapped to each of the Top 5 most attacked sectors. As you can see, some groups have their favorites, including: ?? Lockbit’s aggressive targeting of healthcare systems in 2024 exposed a deep vein of weakness in medical software and systems, including unpatched vulnerabilities in outdated software, VPNs and RDPs ?? Black Basta regularly targets unpatched vulnerabilities and legacy software associated with SCADA systems, also leveraging social engineering tactics to attack the energy sector. ?? IntelBroker is known for using social engineering tactics to exploit vulnerabilities and infiltrate systems, after which they deploy privilege escalation and backdoors to steal the data they hold for ransom. #ProactiveSecurity #BeResilient #CriticalSectors #Cybersecurity
-
?? The recent Linux kernel / Android zero day announcement (CVE-2024-36971) was a timely reminder of the dangers of zero-day vulnerabilities. The #RCE vulnerability impacting the Linux / Android kernel - which was actively being exploited in the wild - has been patched. Unfortunately, there are plenty more where that came from. So what can organizations do to protect themselves? ?? Our blog post takes a look at what makes zero-day attacks so dangerous, walking through the attack lifecycle and outlining some key actions software developers can take to help eliminate weakness and make code more secure. Link in the comments ?? #ProactiveSecurity #CVE #ZeroDay
-
Cybercrime is costing Australian businesses millions annually. With cyber attacks increasing in frequency and sophistication, the financial impact on organizations—especially mid-sized businesses—is staggering. From lost revenue to recovery expenses, the consequences are far-reaching.? ?? The key to protecting your business lies in proactive vulnerability management. Identifying and addressing vulnerabilities early can save you from costly breaches and ensure the security of your critical data.? ?? Did you know? Small and medium businesses account for a significant portion of cybercrime victims, with many unable to recover after a major attack. Strengthening your cyber defenses today safeguards your tomorrow.? ?? Take control of your security posture and reduce your risk. Learn how vulnerability management can make a difference: https://lnkd.in/gqGFPhwG #CyberCosts #FinancialImpact #SMBCybersecurity #RiskMitigation #DataProtection #BusinessSafety #AusCyber #SecureYourBusiness
-
?? Vulnerable by default, exploited with ease: Water and wastewater Industrial Control Systems are the third most vulnerable in 2024 –? Securin analysts have uncovered 800+ vulnerabilities, and counting… ?? With more than 150,000 public water systems in the USA it’s time for urgent action to mitigate weakness across IT and OT systems, for example: CVE-2023-6448: The Unitronics PLC vulnerability exploited by Cyber Av3ngers to target the Municipal Water Authority of Aliquippa. The USA’s Environmental Protection Agency found that 70% of utilities inspected by federal officials in the past year violated standards designed to prevent breaches. Even the smallest providers can be targeted. Who’s attacking? More on that later in the week… #ProactiveSecurity #Water #BeResilient
-
?? New CVEs are being published all the time - 30,000+ in the last year alone - but it’s important not to overlook the old timers that continue to provide fertile ground for attackers, years after they were first uncovered ?? ?? Here are some old favorites that continue to be exploited - and reintroduced during development: ?? CWE-79 (Cross-site Scripting) tops the list with 30,820 CVEs mapped to it, highlighting the prevalent risk of #XSS attacks in web applications. ?? Other consistent performers: CWE-787: Out-of-bounds Write, CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), CWE-200: Exposure of Sensitive Information to an Unauthorized Actor, CWE-20: Improper Input Validation & CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') are the other CVEs that have been consistently in the Top 10. ?? What can you do? Two quick takeaways: 1?? We need more secure coding practices. Modern web applications are complex, but there's no need to keep re-introducing flaws like XSS in 2024. 2?? Keeping pace with the latest threats is critical, but it’s also important not to fall behind. The best proactive security postures keep a strategic eye on prevention as well as prediction. Ready for more? Checkour?blog post - link in the comments. #ProactiveSecurity #SecureByDesign #Cybersecurity #BeResilient
-
Securin Inc.转发了
Customer Success Leader | SaaS Enthusiast | Driving Cybersecurity Solutions | Empowering Businesses with Technology-Driven Growth
A big shoutout to everyone who stopped by our booth during the NM Technology In Education (NMTIE) conference on Nov 14th! It was a pleasure meeting you and hearing your amazing stories about how technology is transforming education and innovation. Conferences like NMTIE remind us of the incredible work happening in our community and the power of collaboration.?? CONGRATULATIONS to Erica Keppel for winning the raffle. If you did not get a chance to connect with us, feel free to reach out here on LinkedIn or visit our website https://www.securin.io/. We’d love to continue the conversation! Here’s to shaping the future together. #NMTIE #Networking #Innovation #ThankYou #NMTIE2024 Richard Bowman, Duane Arruti, Daniel Lunceford, David McGee, Ben Glickler, Daniel Archuleta, and many, many more...
-
+4
-
??? Weak as water? Cyber attacks against US water supplies are increasing, and the stark reality is that it’s too easy. Securin analysis of 75 attacks in 2024 alone shows a sector struggling to implement even basic cybersecurity hygiene. When CISA stated that threat actors are breaching US operational technology using “unsophisticated means”, here’s what that looks like in practice: ?? Vulnerability and misconfiguration exploits: 34% ?? Exploitation of public-facing applications: 19% ?? Compromised credentials: 13% Following several high-profile attacks, water companies have responded well to mitigate the potential damage. But with so much at stake, water and wastewater utilities must prioritize proactive security, and pay attention to IT and OT convergence. What vulnerabilities should water utility defenders be looking for? More on that in our next post. #ProactiveSecurity #BeResilient #Water
-
Playing cyber defense for AI is no different from elsewhere in the software supply chain. The best approach is built on transparency and a thorough understanding of every component, vulnerability and potential entry point within your AI system: a Bill of Materials. ?? Where do you even start? Securin’s analysts headed to Hugging Face and the LVE Project, fired up the machine learning weaponry and started defining and generating an #AIBoM for #LLMs. How did it turn out? Read on (link in the comments)?? #proactivesecurity #cybersecurity #vulnerabilitymanagement
-
?? Securin is proud to be a sponsor at the New Mexico Technology in Education Conference! Join us as we continue to promote a safer digital world for educators and students alike. If you're at the event, connect with our great team members Gaurav Mehta, Ryan Riley, Deb Miller, and Shaundra S.! #Securin #Cybersecurity #EdTech #NMTIE2024