Blogs

Read about the latest news and updates from the cybersecurity ecosystem.

DHS CISA

Posted on Mar 14, 2023 5 minutes

CSW's Threat Intelligence - March 13, 2023 - March 17, 2023

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.

Read More

Supriya Aluri

Posted on Mar 2, 2023 4 minutes

Why Are Some Ransomware Vulnerabilities More Dangerous than Others?

Securin experts mapped ransomware vulnerabilities to the MITRE Att&ck framework and identified 57 vulnerabilities that can be exploited from initial access to exfiltration. Read on to find out more about these vulnerabilities.

Read More

Surojoy Gupta

Posted on Feb 27, 2023 | Updated on Mar 2, 2023

CSW's Threat Intelligence - February 27, 2023 - March 3, 2023

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | February 27, 2023 - March 3, 2023

Read More

Supriya Aluri

Posted on Feb 17, 2023 4 minutes

All About Hive Ransomware

One of the most prolific ransomware groups to affect healthcare facilities, nonprofits, retailers, energy providers, and other sectors, with a total of more than 1,300 institutions hit by the ransomware group worldwide and a profit of $100 million in ransom payments, Hive Ransomware has been ruling the roost since June 2021. Read on to find out what Securin experts uncovered when they revisited HIVE and their attack tactics and techniques, and what organizations can do to remain safe from future attacks.

Read More

Surojoy Gupta

Posted on Jan 30, 2023 | Updated on Feb 3, 2023 6 minutes

CSW's Threat Intelligence - January 30, 2022 - February 3, 2022

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | January 30, 2022 - February 3, 2022

Read More

Supriya Aluri

Posted on Jan 9, 2023 | Updated on Jan 17, 2023 6 minutes

CSW's Threat Intelligence - January 9, 2022 - January 13, 2023

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.

Read More

Supriya Aluri

Posted on Dec 30, 2022 7 minutes

How Safe is your Database?

A data breach resulting in the loss of their jobs is one of the worst nightmares for a CISO. Companies that have experienced a breach underperform the market by more than 15% three years later. That raises the question - “Is your data safe?” CSW analyzed more than 290 database products and identified 4352 vulnerabilities, of which 24% have high predictive risk ratings, and 12% are trending in the wild! What should be your course of action?

Read More

Priya Ravindran

Posted on Dec 27, 2022 | Updated on Dec 30, 2022 3 minutes

CSW's Threat Intelligence - December 26, 2022 - December 30, 2022

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.

Read More

Supriya Aluri

Posted on Dec 23, 2022 | Updated on February 3, 2023 4 minutes

All About Vice Society Ransomware

Vice Society has been recently observed employing multiple ransomware variants, similar to the Russian Sandworm Team and TA505 threat actors, apart from its double extortion tactics. After its recent attacks on the US K-12 education and healthcare sectors, Vice Society has garnered a lot of media attention. Read on to learn how to protect your network from Vice Society attacks.

Read More

Surojoy Gupta

Posted on Dec 5, 2022 | Updated on Dec 9, 2022 5 minutes

CSW's Threat Intelligence - December 5, 2022 - December 9, 2022

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | December 5, 2022 - December 9, 2022

Read More

Supriya Aluri

Posted on Nov 28, 2022 | Updated on Dec 2, 2022 5 minutes

CSW's Threat Intelligence - November 28, 2022 - December 2, 2022

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | November 28, 2022 - December 2, 2022

Read More

Supriya Aluri

Posted on Nov 7, 2022 | Updated on November 11, 2022 6 minutes

CSW's Threat Intelligence - November 7, 2022 - November 11, 2022

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | November 7, 2022 - November 11, 2022

Read More

Priya Ravindran, Supriya Aluri

Posted on Oct 18, 2022 | Updated on Oct 21, 2022 6 minutes

CSW's Threat Intelligence - October 17, 2022 - October 21, 2022

This blog brings you all the DHS CISA KEVs that need to be prioritized for patching from Oct 17, 2022 to Oct 21, 2022

Read More

Supriya Aluri

Posted on Oct 10, 2022 | Updated on Oct 14, 2022 5 minutes

CSW's Threat Intelligence - October 10, 2022 - October 14, 2022

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | October 10, 2022 - October 14, 2022

Read More

Supriya Aluri

Posted on Sep 23, 2022 3 minutes

Cyberwar Bulletin: Iran and Albania

As the world still reels under the impact of the Ukraine-Russia cyberwar, yet another Cyberwar has started between Iran and Albania. CSW experts provide insights into Iranian threats that organizations need to watch out for. 

Read More

Priya Ravindran

Posted on Sep 12, 2022 | Updated on Sep 16, 2022 6 minutes

CSW's Threat Intelligence - September 12, 2022 - September 16, 2022

We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.

Read More

Priya Ravindran

Posted on Jun 13, 2022 2 minutes

CISA Adds Vulnerabilities Warned by CSW’s Ransomware Reports

In a recent update of KEV on May 23, 2022, CISA has added three of four vulnerabilities that were called out in the CSW’s Q1 2022 Ransomware Report (May 18, 2022) thereby validating our research and recommendations.

Read More

Priya Ravindran

Posted on Mar 2, 2022 | Updated on July 6, 2022 5 minutes

Latency Analysis of DHS CISA KEVs

In this blog, CSW experts analyzed CISA’s Known Exploited Vulnerabilities (KEV) list for latencies in publishing, exploiting, and patching to understand how fast attackers are weaponizing them for attacks.

Read More

Priya Ravindran, Sumeetha Manikandan

Posted on Mar 2, 2022 | Updated on March 01, 2023 3 minutes

Top Scanners Fail to Flag DHS CISA-warned Known Exploited Vulnerabilities (KEV)

We looked into the DHS CISA KEV catalog one step further and found that 59 actively known exploited CVEs were missed by top scanners such as Nessus, Nexpose, and Qualys. Click here to know more!

Read More

Pavithra Shankar, Priya Ravindran

Posted on Nov 22, 2021 | Updated on March 01, 2023 5 minutes

CISA Releases a Directive Asking Organizations to Patch Known Exploited Vulnerabilities

The DHS Cybersecurity and Infrastructure Security Agency (CISA) released a directive with a list of 887 known and exploited vulnerabilities that public sector entities and organizations need to patch immediately!

Read More

Surojoy Gupta, Priya Ravindran, Pavithra Shankar