Articles by category
You are not the weakest link
I’ve been going through recaps of recent cyber-attacks and have seen more than one reference to people as being the weakest link. I’m tired of this excuse. All the tech we use is built by humans, or built by ro...
Novel version of Racoon Stealer malware detected
CYDEF was among the first to recognize the program as a threat. Learn about what we saw and how we detected this trojan.
MGM Attack – If it happened so fast, why is anyone spending so much on cybersecurity?
Where does this leave you? If an organization like MGM, and so many others can’t stop these attacks, why would you invest in cybersecurity?
Women Reshaping The Cybersecurity Industry
Elana Graham of CYDEF on the Five Things You Need to Create a Highly Successful Career in the Cybersecurity Industry
Large tech company saved from catastrophic ransomware
Learn how CYDEF detected a Cobalt Strike payload, saving a large customer from a multi-million dollar ransomware.
Building Trust as a Service Provider – It’s a process
In cybersecurity, we continuously use the word "trust" in all kinds of contexts: trusted partner, zero trust, digital trust, and more. But what does it mean for you?
Why AI fails spectacularly at cybersecurity
If Artificial Intelligence is so powerful, why are cybersecurity vendors offering human threat hunting as an additional service?
CYDEF customer targeted by nation state actor
Learn how CYDEF detected the 3CX supply chain attack that targeted one of our customers.
Five Questions to Ask Before Choosing an MDR Solution
As the name implies, Managed Detection and Response (MDR) is a cybersecurity service providing detection and response capabilities that minimize the impact of an incident. But what does that mean? We’ll dig into the topic and share questions you should ask your service provider. MDR is a combination of technology and services. The technology provides a range of protection, [...]
How one client found out their cybersecurity tools failed them
Recently, a large organization with many locations decided to take us up on our free 30-day trial to see if we would find anything their current cybersecurity stack missed. While they were interested in our Managed Detection and Response (MDR) service, they didn’t expect us to find anything. The plan was to install our agent on various systems in multiple [...]
The Log4j vulnerability and why patches aren’t enough
You may have read recently about Apache’s Log4j vulnerability impacting vendors such as Microsoft, Cisco, IBM, Amazon Web Services, VMware, ConnectWise, Fortinet, and even the US and Canadian governments. After a thorough review, we confirm that none of our products and services, including the software agents and web portals, utilize Log4j. Thus, we are not vulnerable to the recently disclosed [...]
Cybersecurity Acronym Soup
LinkedIn presents an endless list of concerns and complaints about the ongoing evolution of cybersecurity acronyms. But, to be honest, new acronyms do little to highlight a solution's function. Take XDR, its function is as clear as mud. To shed some light on the alphabet soup of acronyms, I put together a list of solutions, their objectives, and their [...]