June Security Roundup | Atomic Stealer updates, MITRE mapping, breach trends & more

June Security Roundup | Atomic Stealer updates, MITRE mapping, breach trends & more

Reversing Atomic macOS Stealer

We keep a tight pulse on?malware trends, and one of the more interesting infostealer families is Atomic Stealer, which notoriously targets macOS devices.

We wanted to learn more about it, so we reverse-engineered it to uncover:

  • Detection challenges
  • Sneaky features
  • Scope of potential impact
  • Red flags and warning signs

There’s no question Atomic packs a solid punch, able to capture things like admin and keychain passwords, sensitive system information, as well as credentials and browser information from Chrome, Firefox, and other applications on a victim’s computer. Listen in to a recap of our findings or read our latest blog for details, including what defenders should be on the lookout for and how to properly remediate exposures stemming from Atomic infections.

Keep Reading>>


Trending?

Using Breach and Malware Infection Data in Your MITRE ATT&CK Mapping

In this article, we explore cybercriminal behavior relating to two phases of the MITRE ATT&CK framework – Reconnaissance and Resource Development – and why it’s critical to account for stolen data in your larger detection and attack prevention strategies.

?

Breaking Down the 2024 Verizon Data Breach Investigations Report

The annual Verizon Data Breach Investigations Report (DBIR) is full of critical insights and trends, but at over 100-pages, it can be overwhelming. Our team breaks down key findings and takeaways in this blog post.


In Case You Missed It...

?What to Watch for Following the Post Millennial Data Breach

Last month, over 87 million records, including over 57 million distinct email addresses and over 39,000 passwords, were leaked from 3 databases tied to The Post Millennial news outlet. See what we found upon parsing and analyzing the data, and get recommendations to minimize your risk following the breach.

?

Should Security Teams Invest in Continuous Zero Trust?

If your Zero Trust architecture doesn’t continuously monitor for and remediate identity exposures that can bypass your authentication systems (like MFA and SSO), your organization may be open to unintended risk. This blog outlines steps you can take to pivot to a Continuous Zero Trust framework.


SpyCloud Labs

?

The SpyCloud Approach to Responsible Disclosure of Breached, Leaked, and Stolen Data

In light of the continuing stream of high-profile and public cyber incidents, we wanted to shed some light on SpyCloud’s approach to responsibly disclosing breach and malware data to victims. Learn more about our RD Team and their proactive process.


NEW Product

New! Compromised Credit Card API Prevents Fraud Losses, Before They Happen

Credit cards, gift cards, and loyalty cards exposed on the dark web put financial institutions and retailers at risk. With the new SpyCloud Compromised Credit Card API, you can query your own BIN(s) to proactively scan issued cards for compromise, and remediate exposures before fraud can occur.


In Other News

Closing the Cookie Gap: Reaching a Continuous Zero-Trust Model

SpyCloud's Chief Product Officer Damon Fleury breaks down the key ingredient missing from a more robust and continuous Zero Trust approach?– monitoring for and proactively remediating compromised session cookies.


Upcoming Events

Black HatUSA | Las Vegas, NV,?August 6-8: We are going big this year. Stop by our booth #4424 and meet our team.

Annual IAFCI ConferenceUSA | Henderson, NV, Aug 26-30: We will be presenting a live demo of INV on 8/28 at 9AM PST with our Sr. Investigator.


What Do Criminals Know About Your Organization?

Ignorance is not bliss. Know immediately if your domain has malware-siphoned data circulating in the criminal underground with a simple search.

Check Now >>

要查看或添加评论,请登录

社区洞察

其他会员也浏览了