Topic: Cyber investigations and threat intelligence
Russia Ukraine Crisis Overview
As a result of Russia’s invasion of Ukraine, cyber threats are likely to increase. Read the latest from our threat intelligence team.
Overreliance on GPS Carries Risk for Everyone
Accenture discusses what are the risks of GPS (global positioning system) and the steps to take to defend against those threats. Read more.
Karakurt rises from its lair
New threat group Karakurt begins operations. Learn about this financially motivated group, how it operates and how to mitigate its attacks. Learn more.
Dark Web Reconnaissance-as-a-Service Thriving
Accenture explores services cyber criminals buy to facilitate their attacks and ways to limit the success of such services. Read more.
Who are latest targets of cyber group Lyceum?
Accenture shares our new findings of a hacking group Lyceum’s latest attacks as it expands its targets and how to mitigate them. Read more.
Diving into double extortion campaigns
Accenture explores Big-Game extortion campaigns focused on the attack timeline and countdown the days leading up to ransomware deployment. Read more.
Moving Left of the Ransomware Boom
Accenture and VMware collaborate using MITRE ATT&CK to document ransomware gang TTPs prior to ransomware to help teams mitigate and respond to a compromise.
Containerize Your IR Timelining
Accenture explains how Incident Response timelining made easy using Docker Plaso to process artifacts from a large list of source types. Read more.
Partnering to Stop Cybercrime: Countering the Cyber Extortionists
Accenture and VMware collaborate using MITRE ATT&CK to document ransomware gang TTPs and Time to Ransom to help mitigate and respond to a compromise. Read more.
Follow the Indicators of Compromise (IOC) Breadcrumbs
Accenture explores unlike breadcrumbs that you can sweep up and throw away, you can’t do that with Indicators of Compromise (IOC) crumbs. Read more.
Cyber threat intelligence: What threat trends tell us
The Accenture Cyber Threat Intelligence team has examined recent threat trends and offers expert perspectives on what to do about them. Read the blog.
Journey into the unknown: Threats to business travel after COVID-19
As vaccinations roll out and international travel resumes, Accenture reveals threat actors will look to exploit business travelers & travel industry. Read more.
Exploiting multi-factor authentication: Criminals further evolving their tactics to compromise protected accounts
Accenture talks about the multi-factor authentication (MFA) to prevent account theft as passwords are often not enough for account protection. Read more.
Why it‘s good for cybercriminals if we all get connected
Accenture reveals organizations can withstand the security challenges in connectivity by sharing knowledge and developing standardized systems. Read more.
Preparing for the next big supply chain compromise: 5 possible things organizations can do now
Accenture reveals supply chain breaches are increasing in frequency with 40% of cyberattacks occurring through the cloud or managed service provider. Read more.
It's getting hot in here! Unknown threat group using Hades ransomware to turn up the heat on their victims
Accenture reveals an unknown threat group is using self-proclaimed Hades ransomware in cybercrime operations that have impacted three victims. Read more.
Understanding today’s cyber threatscape–How to tackle cyber fraud
Accenture Security leaders at a techUK webinar discussed rising trends, including threats from emerging tech and how to tackle cyber fraud. Read more.
How cybercriminals are finding new ways for us to “stand and deliver“
Cybercriminals are using sophisticated approaches to demand ransomware. Read Accenture's blog to know-how.
Cloudy with a chance of mischief: How cybercriminals are accessing cloud resources
Accenture reveals cybercriminals are targeting organizations lacking cloud security measures as more companies move their operations to the cloud. Read more.
Hard lessons learned: Threat intel takeaways from the community response to Solarigate
Accenture's blog shows what can we learn as cyber threat intelligence providers from the SolarWinds breach & better communicate about cyber threats. Read more.
Ready-made cybercrime is the latest security threat
Accenture's 2020 Cyber Threatscape report reveals that cybercriminals use both masked and noisy cyberattacks to complicate threat detection. Read more.
Machete adopts LokiRat as part of their toolset
Accenture Cyber Threat Intelligence observed Machete, a Spanish-speaking cyber-espionage threat group, integrate LokiRat code into their toolset. Learn more.
How new sophisticated attacks threaten our favorite places
Cybercriminals are finding ways to attack the platforms that we use and love. Learn more.
Tracking and combatting an evolving danger: Ransomware extortion
More companies are being targeted with various new extortion techniques and ransomware gangs are accumulating large profits. Learn more.
Four things CISOs should be doing right now
Accenture's blog explains four tips for CISOs who want to ensure security is implemented throughout their organization and is effective. Read more.
Win the hearts of incident responders with Windows logging
Accenture's blog describes how to leverage Windows logging for incident response. Read more.
Turla uses HyperStack, Carbon, and Kazuar to compromise government entity
Turla, identified internally by Accenture Cyber Threat Intelligence as Belugasturgeon, targets government organizations using custom malware. Read more.
Shady deals: The destructive relationship between network access sellers and ransomware groups
Ransomware groups are taking advantage of opportunities to purchase network access on dark web forums to compromise networks and unleash malware. Learn more.
State-aligned adversaries and COVID-19: How has COVID-19 impacted your strategic cyber threat model?
Accenture's blog discusses the importance of reviewing a strategic threat model now as organisations work to understand the pandemic’s impact. Read more.
Active defense: Sweep the leg!
Accenture's blog shares how your organization can better prepare for a proactive defense posture. Read more.
Extortion entrepreneurs: How cybercriminals are bullying businesses
In this blog post, Accenture's Paul Mansfield describes various threat actor tactics used to extort organisations. Read more.
Threat hunting: Disrupting advanced adversaries
This blog post takes a deep dive into Accenture’s threat hunting approach, exploring the phases of the cycle and sharing a recent case study.
collapsed press enter or space to expand
expanded press enter or space to collapse
Subscribe to Accenture's Cyber defense blog Subscribe to Accenture's Cyber defense blog
Follow us: Follow us: