Intelligence

Our latest thinking and insights.

Cyber Intelligence Weekly (May 22, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (May 22, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act, Flaw in Texas Website Exposed 1.8 Million Resident’s Data for Years, and Microsoft Bing’s Chinese Political Censorship of Autosuggestions in North America.
Posted on May 22 / 2022
Hacker’s Perspective: Web App Vulnerabilities - Algolia API Keys
Hacker’s Perspective: Web App Vulnerabilities - Algolia API Keys
Are you exposing your company's internal data? Algolia APIs are extremely useful for efficient access to stored data, but the keys used to access them are easily misconfigured and can give attackers access to allow an attacker to launch a site-wide attack.
Posted on May 16 / 2022
Cyber Intelligence Weekly (May 15, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (May 15, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Thousands of Websites Collect Your Data in Web Forms Before Form Submission, DEA Law Enforcement Portal Possibly Breached, Businesses Seek to Soften Up SEC Cybersecurity Reporting and Disclosure Rules
Posted on May 15 / 2022
Cyber Intelligence Weekly (May 8, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (May 8, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Data Broker Is Selling Location Data of People Who Visit Abortion Clinics, Nakasone Says Cyber Command Did Nine 'Hunt Forward' Ops Last Year, Heroku Recently Forced Customer Password Resets After GitHub OAuth Token Theft
Posted on May 08 / 2022
Cyber Intelligence Weekly (May 1, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (May 1, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Russia Sanctions Complicate Paying Ransomware Hackers, French Fiber Optic Attack Highlights Physical Vulnerabilities to Critical Infrastructure, FBI Conducted Millions of Searches of Americans’ Data Last Year
Posted on May 01 / 2022
Cyber Intelligence Weekly (April 24, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (April 24, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: T-Mobile Breached Again, This Time by Lapsus$, Criminals Abuse Apple Pay in Spending Sprees, Millions of Lenovo Laptops Contain Firmware-Level Vulnerabilities
Posted on Apr 24 / 2022
Right in your Lapsus$ – How Attackers are Playing a Different Game
Right in your Lapsus$ – How Attackers are Playing a Different Game
Many cutting-edge security programs base their defenses on sophisticated, nation-state level threat actors. How, then, have so many of them gotten hacked recently by a new and less-sophisticated group, Lapsus$?
Posted on Apr 19 / 2022
Cyber Intelligence Weekly (April 17, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (April 17, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems, Widely Used Autonomous Hospital Robots at Risk of Remote Hijacking, Mirai Malware Leveraging Spring4Shell Exploits for Botnet Delivery
Posted on Apr 17 / 2022
What the Lapsus$ Attacks Should Teach Us About Third-Party Insider Threat
What the Lapsus$ Attacks Should Teach Us About Third-Party Insider Threat
The Lapsus$ attacks have helped companies realize that third-party vendors can be the 'weakest link' within their own organizations. This article summarizes what companies can learn (and do) to protect data.

Posted on Apr 11 / 2022
Cyber Intelligence Weekly (April 10, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (April 10, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: US Government Disrupts Russian Government Controlled Botnet, German Federal Police Shut Down Russia’s Dark Web Market, Hydra, Block Says Former Worker Accessed U.S. Customer Data Without Approval
Posted on Apr 10 / 2022
Looking Inward, Charting a New Course for Effective TPRM
Looking Inward, Charting a New Course for Effective TPRM
Most current third-party risk management (TPRM) programs are external-facing. But what if the greatest threat to your organization wasn’t external?
Posted on Apr 06 / 2022
Cyber Intelligence Weekly (April 3, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (April 3, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Software Giant Globant Confirms Breach after LAPSUS$ Shares 70GB of Stolen Data, Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”, Critical GitLab Vulnerability Allows Attackers to Take Over Accounts
Posted on Apr 03 / 2022
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
The year 2021 brought about some serious cyber challenges. This article summarizes key takeaways from CrowdStrike's Global Threat Landscape report, provides a breakdown of the five 2021 themes, and gives our take on seven recommendations that resonate most with us.
Posted on Apr 01 / 2022
Cyber Intelligence Weekly (March 27, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (March 27, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Okta Compromise by LAPSUS$ Causes Massive Concern, LAPSUS$ Hackers Leak 37GB of Microsoft's Alleged Source Code, U.K. Police Arrest 7 Related to LAPSUS$ Hacks on Tech Firms
Posted on Mar 27 / 2022
The Countdown Begins for Financial Institutions Using FedLine Solutions
The Countdown Begins for Financial Institutions Using FedLine Solutions
In January 2021, the Federal Reserve Banks implemented the Security and Resiliency Assurance Program outlining new compliance requirements for banks that use FedLine® by the end of 2022. This article outlines everything you need to know about this new program.
Posted on Mar 23 / 2022
Cyber Intelligence Weekly (March 20, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (March 20, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Germany Warns Against Use of Kaspersky Antivirus Software, Microsoft Defender Tags Office Updates as Ransomware Activity, Ukraine’s President Zelensky Deepfaked in False Surrender Tactic
Posted on Mar 20 / 2022
eLearnSecurity’s Web Application Penetration Tester eXtreme: Overview and How to Prepare for the Exam
eLearnSecurity’s Web Application Penetration Tester eXtreme: Overview and How to Prepare for the Exam
The eWPTX is an expert-level certification covering advanced web application exploitation and analysis. Here’s one cybersecurity consultant’s experience and tips on how to prepare.
Posted on Mar 17 / 2022
Maturing Your IAM Program Part One: Role-Based Access Control (RBAC)
Maturing Your IAM Program Part One: Role-Based Access Control (RBAC)
Role Based Access Control (RBAC) has become the holy grail of access management. So why isn't everyone using it? Here are a few tips on how to strategically approach your RBAC adoption journey.
Posted on Mar 16 / 2022
Cyber Intelligence Weekly (March 13, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (March 13, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: SEC Steps up Cybersecurity Requirements in a Big Way, Hackers in Space Disrupt Satellite Systems and Customers, Serious Flaw Found in Microsoft’s Azure Automation Service
Posted on Mar 13 / 2022
Cyber Intelligence Weekly (March 6, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (March 6, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Senate Passes Cyber Incident Reporting Bill, House Next Up, Kinetic and Cyber Warfare, Microsoft Responds, Conti Ransomware Group Data Leaked by Security Researcher
Posted on Mar 06 / 2022
The Countdown is On: New Cyber Incident Reporting Requirements for Banks
The Countdown is On: New Cyber Incident Reporting Requirements for Banks
Lawmakers have argued about mandatory cyber incident reporting for years, but it has never gained the traction needed to become widespread law. For those in the banking industry, this is all about to change.
Posted on Mar 02 / 2022
Echelon Risk + Cyber Joins CrowdStrike’s Elevate Partner Program
Echelon Risk + Cyber Joins CrowdStrike’s Elevate Partner Program
Partnership Delivers Best-in-Class Solutions and Services to Help Companies Stop Breaches and Achieve a Higher Level of Endpoint Protection
Posted on Feb 28 / 2022
Cyber Intelligence Weekly (Feb 27, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Feb 27, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Ukrainian Hacktivists Fight Back Against Russian Aggressors in Cyber Space, F12 Does Not Equal Hacking, Missouri Governor’s Call for Investigation Proves Worthless, and South Korean Researchers Crack Code for Hive Ransomware
Posted on Feb 27 / 2022
Case Study: MetaOptima Enhances Security Practices through a Web Application Assessment
Case Study: MetaOptima Enhances Security Practices through a Web Application Assessment
As an organization that stores sensitive medical data, MetaOptima is focused on investing in their security posture. Here's how Echelon Risk + Cyber helped ensure they are functioning at their most secure level.
Posted on Feb 22 / 2022
Cyber Intelligence Weekly (Feb 20, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Feb 20, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: San Francisco 49ers Hit with Ransomware Attack, As Russia/Ukraine Tensions Mount, So Do Cyber Concerns Globally, No One Cares About Your Wordle Score, Or Your Privacy
Posted on Feb 20 / 2022
How Safe is it to Scan a QR Code?
How Safe is it to Scan a QR Code?
QR codes are clever (just ask Coinbase), but they can be security nightmares. Here’s what our CEO, Dan Desko, had to say when he was interviewed about this year’s Super Bowl ad.
Posted on Feb 15 / 2022
Cyber Intelligence Weekly (Feb 13, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Feb 13, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Laundering $4.5 Billion of Bitcoin is Apparently Pretty Difficult, Decryptor Released for Several Ransomware Strains, IRS Transitions Away from Plans to use Facial Recognition
Posted on Feb 13 / 2022
Cyber Intelligence Weekly (Feb 6, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Feb 6, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Chinese Surveillance Key Area of Concern as 2022 Olympics Kickoff, Major German Oil Storage Company Hit by BlackCat Ransomware, and Man at Home in Pajamas, Takes Down North Korean Internet
Posted on Feb 06 / 2022
Hacker’s Perspective: Web App Vulnerabilities – Hacking GraphQL
Hacker’s Perspective: Web App Vulnerabilities – Hacking GraphQL
GraphQL is a commonly used query language for manipulating APIs. Properly secured, it is a useful tool for web application development. Configured improperly, it can have devastating results.
Posted on Jan 31 / 2022
Continuous Penetration Testing: Shattering the Hourglass
Continuous Penetration Testing: Shattering the Hourglass
Threats are continuously evolving - your pen testing should too. As attackers constantly find new vulnerabilities to exploit, a continuous penetration testing approach persistently emulates threat actor activity within a company’s unique environment, helping them stay secure over time.
Posted on Jan 31 / 2022
Cyber Intelligence Weekly (Jan 30, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Jan 30, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Supposed Belarusian “Hacktivists” Disrupt Belarusian Railways with Ransomware, Ukraine Wiper Malware Used Code Repurposed from Another Ransomware, and White House Making Good on Promised Cyber Strategy.
Posted on Jan 30 / 2022
Hacker’s Perspective: Web App Vulnerabilities – Password Reset Feature
Hacker’s Perspective: Web App Vulnerabilities – Password Reset Feature
Password Reset features can be dangerous and must be implemented securely. Otherwise, user accounts can be compromised.
Posted on Jan 24 / 2022
Cyber Intelligence Weekly (Jan 23, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Jan 23, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Crypto.com Loses $30 Million in Crypto Through Hack, Cyberattack Affects Red Cross Work, Exposes Confidential Data for Vulnerable People, Hackers Got Comfy Inside Ukrainian Systems for Months Before Launching Attacks
Posted on Jan 23 / 2022
Hacker’s Perspective: Web App Vulnerabilities – Detailed Error Messages
Hacker’s Perspective: Web App Vulnerabilities – Detailed Error Messages
Detailed error messages may seem unimportant, but they can be very valuable for attackers. Here's more on why they are important and how you can fix this web app vulnerability.
Posted on Jan 18 / 2022
Cyber Intelligence Weekly (Jan 16, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Jan 16, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Russia Pretends to Care About Criminal Cybersecurity Activity for a Day, Ukraine State Websites Hit with Cyber Attack, and EU Police Agency, Europol, Forced to Delete Mass Amounts of Personal Data
Posted on Jan 16 / 2022
Hacker’s Perspective: Web App Vulnerabilities – Invite Feature
Hacker’s Perspective: Web App Vulnerabilities – Invite Feature
Hidden dangers within your web app’s ‘invite’ feature, why it matters, and how you can fix it.
Posted on Jan 13 / 2022
CMMC 2.0 - Three Big Reasons to Start the Compliance Process Now
CMMC 2.0 - Three Big Reasons to Start the Compliance Process Now
The DoD’s Cybersecurity Maturity Model Certification (CMMC) framework is changing, but there are many advantages to beginning your compliance journey now rather than later.
Posted on Jan 13 / 2022
Cyber Intelligence Weekly (Jan 9, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Jan 9, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Commercial Antivirus Products Now Come with Free Crypto Miners! (Not Kidding), Stalking/Privacy Concerns Abound with Apple AirTag Device, and Russian IT Exec Recently Captured for Insider Trading May Have Deep Kremlin Ties
Posted on Jan 09 / 2022
Cyber Intelligence Weekly (Jan 2, 2022): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Jan 2, 2022): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Cheers to Y2K22! Should old acquaintance Microsoft Exchange be forgot, and never brought to mind?, Users of Popular Password Manager Targeted in Credential Stuffing Attacks, and Shutterfly Hit with Massive Ransomware Attack
Posted on Jan 02 / 2022
Top 10 Cybersecurity Articles in 2021
Top 10 Cybersecurity Articles in 2021
At Echelon, our team takes pride in contributing to and participating in our cybersecurity community. We regularly publish articles on our Intelligence blog to help our clients (and everyone!) stay vigilant. Here are the top 10 articles from 2021.
Posted on Dec 20 / 2021
Cyber Intelligence Weekly (Dec 19, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Dec 19, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Log4j Fallout Continues and New Vulnerabilities Uncovered, What Management Should be Asking About Log4j/Log4Shell, Microsoft and Mandiant Observe Exploitation of Log4Shell in the Wild
Posted on Dec 19 / 2021
Log4shell: How Attackers are (Currently) Breaking the Internet, and How to Mitigate
Log4shell: How Attackers are (Currently) Breaking the Internet, and How to Mitigate
Websites are like buildings. If your website's foundation is vulnerable to Log4j, check out this overview of the attack, how to test for it, and how to mitigate it.
Posted on Dec 16 / 2021
Top 7 Cybersecurity Predictions for 2022
Top 7 Cybersecurity Predictions for 2022
As 2021 winds down, we take a peek into the future of cybersecurity for 2022. Will our predictions come true?
Posted on Dec 14 / 2021
Cyber Intelligence Weekly (Dec 12, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Dec 12, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Critical Vulnerability in Ubiquitous Java Logging Utility, Log4j, America Runs on D̶u̶n̶k̶i̶n̶ AWS, Emotet Malware Making a Strong Comeback
Posted on Dec 12 / 2021
Cyber Intelligence Weekly (Dec 5, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Dec 5, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Former Ubiquiti Developer Charged by FBI for Extorting His Employer, NSO Group Tools Target U.S. and Other Officials in Uganda, and Hackers Are Spamming Businesses’ Receipt Printers With ‘Antiwork’ Manifestos
Posted on Dec 05 / 2021
Cyber Intelligence Weekly (Nov 28, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Nov 28, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: GoDaddy Announces Security Incident Affecting Managed WordPress Service, Apple Sues NSO Group to Curb the Abuse of State-Sponsored Spyware, Brian Krebs Rings Alarm Bell on Zelle Fraud Scam for a Second Time
Posted on Nov 28 / 2021
Cyber Intelligence Weekly (Nov 21, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Nov 21, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: United States Charges Two Iranians with Attempting to Interfere with 2020 Presidential Election, $500 million in Cyber Spending Inches Closer to Reality as Part of 'Build Back Better' Bill, and Cisa Release Playbook for Incident Response.
Posted on Nov 21 / 2021
Cyber Intelligence Weekly (Nov 14, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Nov 14, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Robinhood Announces Data Breach, Millions of Records Involved, FBI Systems Abused in Hoax Email Blast, 50+ Flaws In This Month’s Patch Tuesday from Microsoft.
Posted on Nov 14 / 2021
Embracing New Technology? Here’s How to Keep Cybersecurity Top of Mind
Embracing New Technology? Here’s How to Keep Cybersecurity Top of Mind
As technology advances at an unprecedented pace, many businesses are aggressively accelerating adoption to maintain a competitive advantage. But there’s a big risk for those who don’t keep cybersecurity top of mind.
Posted on Nov 10 / 2021
Cyber Intelligence Weekly (Nov 7, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Nov 7, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Department of Defense Cybersecurity Framework - CMMC - Gets Major Overhaul, Company Directors and Boards in the Crosshairs Over Cyber Incidents, and Israeli Spyware Producer NSO Group Blacklisted by US Government
Posted on Nov 07 / 2021
CMMC Update: November 5, 2021 - Five Key Takeaways
CMMC Update: November 5, 2021 - Five Key Takeaways
The Cybersecurity Maturity Model Certification (CMMC) underwent a huge makeover in the last 48 hours. Here is what you need to know.
Posted on Nov 05 / 2021
Cyber Intelligence Weekly (Oct 31, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Oct 31, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Microsoft Sets Sights on Closing the Cybersecurity Skills Gap, PAX Technology Raided by FBI, Key Member of REvil Ransomware Gang Identified.
Posted on Oct 31 / 2021
Cyber Intelligence Weekly (Oct 24, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Oct 24, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Ransomware Gang Recruits Tech Talent Through Fake Company, High Profile YouTube Accounts Targets for Hackers, and Maker of Candy Corn Hit by Ransomware
Posted on Oct 24 / 2021
Cyber Intelligence Weekly (Oct 17, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Oct 17, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Clicking the F12 Button Considered ‘Hacking’ Per Missouri Governor, Deep Fakes Gaining Steam in Elaborate Social Engineering Attacks, and Phishers Getting Tricky with Coinbase Fraud
Posted on Oct 17 / 2021
Cyber Intelligence Weekly (Oct 10, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Oct 10, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Facebook, Instagram and WhatsApp Endure Major Outage, Major Telecom Provider Announces Five-Year-Long Security Breach, and Twitch Confirms Massive Breach, Company Data on 4Chan.
Posted on Oct 10 / 2021
SC Media Interview: Cyber pros used OSINT and sock puppets to aid mass Afghanistan evacuation
SC Media Interview: Cyber pros used OSINT and sock puppets to aid mass Afghanistan evacuation
In this interview and article from SC Media, Dan Desko and Dahvid Schloss discuss how the Echelon Risk + Cyber team used their cyber skills to help at least 50 Afghan refugees to safety.
Posted on Oct 08 / 2021
Risk + Cyber Perspectives: Securing Financial Services
Risk + Cyber Perspectives: Securing Financial Services
In this video discussion with Matt Tolbert, Senior Cybersecurity Examiner for the Federal Reserve Bank of Cleveland, Matt and Dan discuss risks of remote workforces, planning for disruptions, mitigating 3rd party risks, going to the cloud, supply chain threats, and resilience in the future.
Posted on Oct 07 / 2021
Case Study: Bell and Howell Improves Cyber Posture with Echelon’s Unique Collaborative Approach to Pen Testing
Case Study: Bell and Howell Improves Cyber Posture with Echelon’s Unique Collaborative Approach to Pen Testing
Bell and Howell partnered with Echelon Risk + Cyber to test the security of their systems, ensuring that they will continue to be protected from future cyberattacks and avoid any future disruption to their systems.
Posted on Oct 06 / 2021
Mission Matters Interview: Dan Desko + Adam Torres
Mission Matters Interview: Dan Desko + Adam Torres
Our CEO and Founder Dan Desko was recently interviewed for Mission Matters Innovation with Adam Torres. The interview focuses on our core belief that security and privacy are basic human rights. We're built to live that mission every day.
Posted on Oct 06 / 2021
Cyber Intelligence Weekly (Oct 3, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Oct 3, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Death of Infant Nicko Silar Blamed on Ransomware, MFA Meets its Match?, and VMware vCenter Server Critical Vulnerability Exploited in the Wild.
Posted on Oct 03 / 2021
Banking in the Cloud: Key Considerations for IT Leaders
Banking in the Cloud: Key Considerations for IT Leaders
Considering a move to the cloud? There's a lot to think about, especially for financial institutions. This article lays out those obstacles and some considerations for overcoming them.
Posted on Sep 28 / 2021
Cyber Intelligence Weekly (Sept 26, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Sept 26, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: 2021 Record Year for Zero-Day Exploits, Massive Credential Leakage Occurring Through Microsoft Autodiscover, and FBI Held Back Kaseya Ransomware Decryption Keys for Weeks
Posted on Sep 26 / 2021
Four Ways to Spice Up Your Penetration Testing Routine
Four Ways to Spice Up Your Penetration Testing Routine
Another year, another penetration test? Attackers are evolving, and so should you. Here are four ways to spice up your pen testing routine to be better prepared and reduce your attack surface.
Posted on Sep 22 / 2021
Cyber Intelligence Weekly (Sept 19, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Sept 19, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Customer Service Outsourcing Giant TTEC Hit by Ransomware, Apple Releases Patch for Zero-Day, and Another Major Microsoft Vulnerability.
Posted on Sep 19 / 2021
Cyber Intelligence Weekly (Sept 12, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Sept 12, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Microsoft Zero Day exploited in the wild, hundreds of public companies in the SEC cyber hot seat for SolarWinds breach, and UN falls victim to major breach.
Posted on Sep 12 / 2021
Cyber Intelligence Weekly (Sept 5, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Sept 5, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Cybersecurity awareness during upcoming holidays, Atlassian Confluence security advisory, and WhatsApp privacy breach fines.
Posted on Sep 05 / 2021
Cyber Intelligence Weekly (Aug 29, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Aug 29, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Biden gets cyber commits from big tech, MS Power Apps leave data exposed, and CosmosDB vulnerabilities.
Posted on Aug 30 / 2021
DefCon 29 in Review: The Best Sessions, Badge Spoilers and More
DefCon 29 in Review: The Best Sessions, Badge Spoilers and More
Have you solved your badges yet? With another DefCon in the books, here's our take on the best sessions and a close up look at some of the badges.
Posted on Aug 26 / 2021
A Hacker’s Perspective: How to Create a Strong Password (Hint, Length Matters!)
A Hacker’s Perspective: How to Create a Strong Password (Hint, Length Matters!)
From a hacker’s perspective, the essence of password security boils down to two things: how guessable is it and how easy is it to crack encrypted passwords. Here are our tips for creating stronger passwords.
Posted on Aug 24 / 2021
Cyber Intelligence Weekly (Aug 22, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Aug 22, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: massive insider threat is looming, BlackBerry vulnerabilities, and updates on previous CIW stories.
Posted on Aug 22 / 2021
Cyber Intelligence Weekly (Aug 15, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Aug 15, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: data breach at T-Mobile, Apple's privacy nightmare, and Microsoft needs to patch patching.
Posted on Aug 16 / 2021
Cyber Intelligence Weekly (Aug 8, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Aug 8, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: Federal agencies failing at cyber, Apple scans your iCloud photos, and a disgruntled ransomware worker acts out.
Posted on Aug 08 / 2021
A Hacker’s Perspective: Top Three Ways to Mitigate Modern Phishing Techniques
A Hacker’s Perspective: Top Three Ways to Mitigate Modern Phishing Techniques
More people fell victim to phishing than any other form of internet crime in 2020, and this trend is likely to continue. But phishing is not just prevalent - it is evolving. Here are three mitigation strategies for modern phishing techniques, from the perspective of a hacker.
Posted on Aug 04 / 2021
CMMC Compliance 101: Answers to Common Questions
CMMC Compliance 101: Answers to Common Questions
Have you Googled CMMC compliance lately? We want to help clear the air. Avoid the marketing jargon and confusing content with these answers to common questions.
Posted on Aug 02 / 2021
Cyber Intelligence Weekly (Aug 1, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Aug 1, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: President Biden's memorandum on Critical Infrastructure Cybersecurity, an FBI official advises against banning ransomware payments, and the search engine for hackable websites returns.
Posted on Aug 01 / 2021
Flexible & Secure Remote Penetration Testing in a Changing World
Flexible & Secure Remote Penetration Testing in a Changing World
Over the past year and a half, the worldwide workforce underwent a drastic and rapid paradigm shift that has brought with it new opportunities, attack vectors, and methods to test security. When testing security with penetration testing, partner with a firm using the most modern, advanced tactics to test your readiness for tomorrow’s attackers.
Posted on Jul 29 / 2021
Search
Sections
Cyber Intelligence Weekly Offensive Security: How to Level Up Hacker's Perspective: Tips for Defenders Compliance CISO's Corner Cyber Career Tips Financial Services Manufacturing

Sign Up for Weekly Cyber Intelligence Delivered to Your Inbox

Sign up to get Cyber Intelligence Weekly in your inbox.
Latest Intelligence