Elementor #8029


Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for February 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In February, the team discussed notable vulnerabilities and trends, took a deep dive into domain controller synchronization (DCSync) attacks, reviewed threat hunting trends, and offered security operations center (SOC) engineering insights. Notable Vulnerabilities and Trends The Vulnerability Management


Read More »

shutterstock imagery


Threat Intelligence, Notable Vulnerabilities, and Current Trends for January 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In January, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting trends, and the cyber threat landscape. Threat intelligence review To begin the webinar, the Senior Manager of Incident Response discussed the most prevalent threats for


Read More »

December SOC webinar blog


Novel Threat Tactics, Notable Vulnerabilities, Current Trends, and Data Leaks

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In December, the team discussed novel tactics, notable vulnerabilities, current trends, and data leaks. Novel Tactics To kick off the webinar, the Director of Incident Response discussed several novel tactics recently used by threat actors including: Supply chain


Read More »

phishing guide blog hero


Agencies Provide Guidance on Phishing

With more than 3 billion phishing emails received each day, employees are bound to make a mistake, clicking on a malicious link that could result in a cyberattack. The Cybersecurity and Infrastructure Security Agency (CISA) estimates that over 90% of successful cyberattacks are initiated by a phishing email. But what exactly is phishing? Phishing is


Read More »

november webinar blog hero


Insights into SOC metrics, recent SOC Engineering Exercises, and more

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In November, the team discussed notable vulnerabilities and trends, gave a crash course on security operations center (SOC) metrics, and provided insights on a recent SOC engineering exercise. Vulnerabilities and Trends The Vulnerability Management Team Lead, looked at


Read More »

Threat landscape blog hero


Prepare for a Challenging Year in the Threat Landscape

A data breach is a cyber incident that violates the sensitive, protected, or confidential data of an organization. The breach can be overt, such as a ransomware attack where a threat actor holds an organization’s data hostage until the organization pays the ransom demand, or covert, such as a malware attack where a threat actor


Read More »