Insights

This is where we share our expertise, thoughts and advice.

The latest trends in cybersecurity: AI, an asset or a risk?

Many organizations have adopted AI to enhance their services, searches and code, and this trend is set to continue. However, AI adoption comes with its own risks and cybercriminals are utilizing AI capabilities to aid them in their attacks. What will AI mean for organizations in the future? Is it an asset or a risk to your organization?

Crowdstrike: Microsoft launches tool to save crashed Windows PCs

Since Friday 19 July 2024, and the release of the CrowdStrike update causing a big mess on a global scale, many companies are looking for help. Cybercriminals have understood this well: they have implemented several malicious campaigns. Learn how the problem can be corrected.

Global Microsoft/Crowdstrike IT Outage Cripples Many Businesses

The Crowdstrike outage is historical. Millions of workstations are crashing, around the world. Around 70% of Fortune 100 companies are affected.

The global outage grounded flights and knocked banks, hospital systems and media outlets offline.

We can provide immediate support to address any current vulnerabilities and work towards a swift recovery for your affected systems.

Blast-RADIUS attack threatening enterprise networks

A new vulnerability has been found: the Blast RADIUS attack. This attack represents a danger to the Remote Authentication Dial-In User Service (RADIUS) protocol, an essential network authentication component. This vulnerability may allow adversaries to take control of enterprise networks, telecommunications services, industrial controls, and ISPs.

A new ransomware promises to be El Dorado for cybercriminals

The new Eldorado ransomware targets Windows and VMware ESXi systems, with sixteen victims primarily in the United States across various industries. Groupe-IB researchers observed Eldorado’s activities and announced the threat on RAMP forums. This ransomware uses the ChaCha20 algorithm for encryption and generates unique keys for each locked file.
How can you protect against ransomware? Learn more in the article.

The regression vulnerability in OpenSSH: a threat to enterprise security

A serious vulnerability has been found in OpenSSH on glibc-based Linux systems, which represents an important security risk that might impact your organization and millions of organizations, with now, exposed OpenSSH servers.
Contact us for a thorough assessment and tailored security solutions.

F-22 Raptor jet with another jet in the background during a flight operation.

Navigating CMMC Compliance: Challenges for Small Businesses

Achieving CMMC compliance can be challenging for small businesses, but it’s crucial for securing DoD contracts. Common issues include high costs, limited resources, and complex regulations. Malleum offers comprehensive support with services like our Cybersecurity Readiness Assessment, vCISO service, and managed security solutions. These services help small businesses efficiently navigate compliance, ensuring robust cybersecurity and ongoing protection. Discover how Malleum can streamline your path to CMMC compliance with tailored, cost-effective solutions designed for small businesses.

How to Know You’re Getting a Quality Penetration Test

In the fast-evolving landscape of cybersecurity, ensuring that your organization’s defenses are robust requires more than just off-the-shelf solutions. Penetration testing, or pen testing, is a critical component of a comprehensive security strategy. However, the quality of these tests can vary significantly. Distinguishing a high-quality engagement from a superficial one can be challenging. Here’s what to look for to ensure you’re getting a penetration test that truly enhances your security posture.