Gold Ionic Deploys INC Ransomware
Secureworks
Cybersecurity by security experts for security experts. We are in the fight with you!
Secureworks Counter Threat Unit? (CTU) researchers are monitoring activity conducted by the INC Ransom group, which CTU? researchers track as GOLD IONIC. The threat group, which emerged in August 2023, uses the common double extortion method: they exfiltrate data before encrypting systems and then threaten public exposure as leverage in ransom negotiations with victims.
CTU researchers advise organizations to follow guidance provided by the?U.S. Cybersecurity & Infrastructure Security Agency?(CISA) and the?UK National Cyber Security Centre?(NCSC) to mitigate the risk of ransomware attacks. Organizations should also implement and test incident response plans so they can react quickly if an attack occurs.
Learn more about the ransomware threat:?GOLD IONIC Deploys INC Ransomware | Secureworks
Additional Resources: 2023 State of the Threat: A Year in Review
Navigating Cybersecurity with an Effective SOC
The cybersecurity landscape is in a constant state of flux, with threats becoming more sophisticated and pervasive. In this environment, Security Operations Centers (SOC) are essential for organizations to quickly detect, analyze, and respond to cyber incidents. Organizations need to decide whether an internal, hybrid, or outsourced SOC model is best for them, and then ensure they use the right metrics to measure its performance for continued security while remaining aligned with business objectives.?
Gartner's research suggests that by 2025, a third of organizations will struggle to establish an effective internal SOC due to limitations in budget, expertise, and staffing. Additionally, the cybersecurity industry faces a significant talent shortage, further complicating the establishment and maintenance of an in-house SOC.
领英推荐
Learn how to navigate your options, including the criteria you need to consider when determining whether to manage your own SOC, outsource to a vendor, or take a hybrid approach.?
Read the whitepaper: Uncovering the Right SOC Model for You | Secureworks
The Secureworks Case for Open Cybersecurity Platforms
Open platforms offer the best security outcomes and value to customers over the long run. Simply put, open security platforms offer a combination of native controls and third-party integrations, whereas a closed approach uses controlled solutions tied to a more rigid proprietary system.
Our conviction is rooted in the success of open software approaches, the value we see in diverse data for detections, and how often we see our customers using open security tools to meet their security goals. Open approaches offer adaptability, which is critical to staying ahead of the threat.
Read the blog for more insight: Business value of Open Platforms for Cybersecurity | Secureworks
Additional Resources: Taegis Cloud-Native Enterprise Security Platform | Secureworks