Resources

Browse our media library to learn more about security tips, strategies and the latest security technology insights.

There are no resources matching the selected filters.
Fortinet Acquires Perception Point

At SecureCyber, excellence is at the heart of everything we do. It drives our vision to partner with the leading technology vendors, our mission to deliver the best solutions using top cybersecurity expertise, and our core values of trust and integrity. These principles guide every decision we make to protect our clients in today’s rapidly […]

Learn more
SecureCyber Enhances MXDR Platform Extends FS-ISAC Threat Intelligence to Financial Services Clients

SecureCyber announces new enhancements to its managed extended detection and response (MXDR) platform, with the Financial Services Information Sharing and Analysis Center (FS-ISAC). PR Newswire: SecureCyber MXDR Platform with FS-ISAC Integration. SecureCyber is delivering real-time and actionable threat intelligence, this ingestion significantly increases the company’s ability to detect, analyze, and respond to emerging cyber threats […]

Learn more
SecureCyber Earns #110 Spot on MSSP Alert’s Global Top 250 for 2024

SecureCyber is thrilled to announce that we have been named to the MSSP Alert Top 250 list for 2024! This recognition is a testament to our unwavering commitment to be the innovative protector in cybersecurity, simplifying the complex with a personal touch. MSSP Alert, a leading source for managed security service provider (MSSP) news and insights, […]

Learn more
SCD Continuous Threat Hunting Sources

Continuous Threat Hunting Sources March 24, 2024 Feedly: TeamCity Vulnerability Exploits Lead to Jasmin Ransomware, Other Ma… https://www.trendmicro.com/en_us/research/24/c/teamcity-vulnerability-exploits-lead-to-jasmin-ransomware.html Feedly: Cybercriminals Accelerate Online Scams During Ramadan and Eid Fitr https://www.resecurity.com/blog/article/cybercriminals-accelerate-online-scams-during-ramadan-and-eid-fitr March 23, 2024 Feedly: Ongoing ITG05 operations leverage evolving malware arsenal in globa… https://securityintelligence.com/x-force/itg05-leverages-malware-arsenal/ Feedly: APT29 Uses WINELOADER to Target German Political Parties https://www.mandiant.com/resources/blog/apt29-wineloader-german-political-parties Feedly: Hackers […]

Learn more
The Benefits of a Virtual Chief Information Security Officer (vCISO)

As cyberattacks increase in numbers costing companies time, money, and resources, leadership teams need expert resources to achieve increasing levels of compliance and to protect sensitive data. Having a robust cybersecurity strategy in place is no longer optional—it’s imperative. This is where a Virtual Chief Information Security Officer (vCISO) steps in as a valuable executive-level […]

Learn more
Why Cybersecurity Dominates Corporate Strategy and Regulatory Agendas

In an era where data breaches and cyber threats loom large, the increasing number of cyber-attacks and the financial impact of these attacks have government agencies and corporations understandably on edge. As businesses increasingly rely on third-party software and cloud solutions as well as remote work, cybersecurity has emerged as a critical component of corporate […]

Learn more
SecureCyber Defense Cautions Ohio Lottery Players

CEO Shawn Waldman, was featured on Dayton’s, WDTN news talking about the recent data breach at the Ohio Lottery. Waldman, cautioned Ohio Lottery players and vendors to closely monitor their credit information since the cyber criminals recently released the data they stole on the dark web. See the full story here

Learn more
Checklist for a 2024 Cybersecurity Strategy Review

It’s a good time to refine your cybersecurity strategies as we welcome the new year. Cyber-attack methods are constantly evolving, with new tactics emerging daily. On top of these threats, new regulations taking effect in 2024 mean it’s an ideal time to get started. Here are our recommendations for kicking off your annual cybersecurity review. […]

Learn more
Incident Response the First 48 Hours

When a company experiences a data breach, one critical mistake is not following its incident-response plan or worse yet not having a plan in place. The first 48 hours after the discovery of a data breach are critical. Preplanning allows many vital tasks to be put immediately into action. “Often it’s not what happens in […]

Learn more
FBI Alerts on Technical and Customer Support Fraud

Tech and Customer Support Fraud involves a criminal posing as technical or customer support/service to defraud unwitting individuals. Criminals may offer support to resolve such issues as a compromised email or bank account, delivery delays, a virus on a computer, or a software license renewal. Recent complaints involve criminals posing as customer support for financial […]

Learn more
New SEC Requirements for Registered Investment Advisors

Cybersecurity has become a major concern within the financial services sector. Recognizing the need for increased transparency and improved data security, the U.S. Securities and Exchange Commission (SEC) has issued a new rule1 outlining cybersecurity requirements for all registered investment companies and registered investment advisers (“RIAs” or “advisers”). Implementation of this new SEC rule is […]

Learn more
Increase in Gmail Phishing Attempts

Organizations have fallen victim to Gmail phishing attacks We are observing a high volume of social engineering attacks coming from Gmail. The format for the account names seems to be fairly consistent. Three to four letters and 3 to five numbers. XBFI1234 is an example of the format. Other formats have been observed as well […]

Learn more
SecureCyber Defense Earns Spot on MSSP Alert’s Global Top 250 for 2023

SecureCyber Defense is thrilled to announce that we have been named to the MSSP Alert Top 250 list for 2023! This recognition is a testament to our unwavering commitment to be the innovative protector in cybersecurity, simplifying the complex with a personal touch. MSSP Alert, a leading source for managed security service provider (MSSP) news […]

Learn more
SPIKE – VMware Targeted with Ransomware

Around the world, VMware ESXi servers are being exploited and infected with ransomware with a new Linux version of Abyss Ransomware. This topic was escalated to us via our intelligence platform, indicating a severe spike in communication. Here is a link to a BleepingComputer article with more information. Linux version of Abyss Locker ransomware targets VMware […]

Learn more
Security Tip: How to Handle Suspicious Emails

Emails are a common way of communication, but they can also be a source of scams, phishing, malware, and other threats. How can you tell if an email is suspicious and what should you do if you receive one? Here are some tips on how to handle suspicious emails to keep you from falling victim […]

Learn more
Looking for Cybersecurity Blind Spots

If you are running a FortiGate VPN device, you may be at risk of a critical vulnerability that could allow attackers to access your network and data.  Last month Fortinet released CVE-2023-27997, a critical vulnerability patch. According to recent articles, somewhere between 300-350 thousand devices exposed to the internet are still unpatched against this flaw, […]

Learn more
GeoComply – Technical Risk and Recommendations

Public approval for online sports betting with companies Like DraftKings has increased and so has the number of states that have legalized sports gambling and mobile betting. According to a recent CBS Sports article, sports betting is now legal in 37 states. Many sports fans use popular betting applications such as DraftKings to place bets. […]

Learn more
How to Protect Yourself from Anatsa, the Android Banking Trojan

If you are like most Americans, most of your banking is probably done online, and if you use your Android device beware. The malicious Anatsa banking trojan has resurfaced in several countries, including the United States. The malicious app can steal your banking credentials, credit card details, and payment information by displaying fake login screens […]

Learn more
Priority Dispatch Compromise

June 16, 2023 – Priority Dispatch, used by many healthcare organizations, has reportedly been compromised with Ransomware, specifically LockBit 3.0. There isn’t much known regarding the compromise other than data taken is supposed to be published on June 18th.Many public safety organizations utilize this software to provide medical pre-arrival instructions to victims calling a 911 […]

Learn more
Volt Typhoon Exploits Fortinet SSL VPN

Monday, Fortinet released CVE-2023-27997.  Fortinet users with SSL VPN enabled should be aware of a critical vulnerability that could compromise network security. CVE-2023-27997 is a heap-based buffer overflow bug that allows unauthenticated, remote attackers to execute arbitrary code or commands via specially crafted requests. An attacker could potentially take over your device, access your data, […]

Learn more
Microsoft Outages Update

June 9, 2023 – Over the last week, Microsoft has been experiencing many outages around Outlook.com, OneDrvie and now Azure. The attacks seem to be coming from a hacker group called Anonymous Sudan and is reported to be retaliation due to US involvement in Sudan. However, there is speculation that another country is involved. It is possible […]

Learn more
2023 Verizon Data Breach Investigations Report

Verizon has released its 16th annual Data Breach Investigations Report (DBIR), which analyzed thousands of security incidents and breaches worldwide. The report reveals trends in cybercrime, such as the rising cost and frequency of ransomware, the doubling of pretexting (business email compromise) attacks, and the involvement of human error in most breaches.  Ransomware remains one […]

Learn more
Threat Advisory – Apple and PaperCut

Threat Advisory Notification – Patch NOW PaperCut – The FBI and CISA have issued a joint advisory in regard to the PaperCut platform that is used largely in the education sector. Primarily this will involve upgrading to the most recent version and implementing MFA if you have not done so already. Download the bulletin from the […]

Learn more
Location Tracking Software on Corporate Devices – Beware!

As public approval for online sports betting has increased, so has the number of states that allow sports betting. See the linked CBS sports article from January of this year for states where sports betting is legal. According to the article, it is currently legal to bet in 33 states. Ohio, as of 1 January […]

Learn more
Are You Looking For Fortinet Experts?

It’s Complicated, We Get It! You’ve made an investment in some of the very best Cybersecurity technology on the planet. Now, making it effective in your environment will be a challenge. How do I configure it properly? What are the best practices? What if I need help? Welcome to SecureCyber Defense! We have been a […]

Learn more
There are no resources matching the selected filters.
Centerville Case Study

Summary / Overview After a breach incident, The City of Centerville began examining ways to simplify its cybersecurity measures and develop proactive approaches for monitoring and proactively blocking malicious activities. Centerville, OH is 11 square miles, located across two counties and has a population of approx. 25,000. Solution: Result: Start & End Dates 4/26/2021 – […]

Learn more
Case Study: How the City of Hamilton Took Control of Its Cybersecurity

The Challenge: In 2019, the City of Hamilton found itself under siege by a devastating ransomware attack. Like many municipalities across the United States, they faced an evolving cyber threat landscape without prior experience managing such a crisis. The attack highlighted vulnerabilities in their IT systems and created immense anxiety within the team, unsure of […]

Learn more
Mitigating a Danabot Banking Malware Attack with SecureCyber MXDR

Summary / Overview SecureCyber’s Managed Extended Detection and Response (MXDR) platform successfully identified, contained, and remediated a sophisticated attack involving the Danabot bankingmalware. The incident demonstrates the power of automated threat detection, rapid response, and in-depth forensic investigation in combating advanced threats. Challenge: Identifying and Containing a Novel Malware Attack SecureCyber’s MXDR network monitoring detected […]

Learn more
Why People are Susceptible to Phishing

James Robinson, Ph.D, University of Dayton, Why People are Susceptible to Phishing.

Learn more

Contact our sales team