Hackers have used red team tool EDRSilencer to make the Windows Filtering Platform (WFP) block a list of EDR products from communicating with their management consoles. this software can affect any Windows workstation or Windows server that runs an EDR.
ProCircular Team
Recent Posts
Topics: Cybersecurity, Network Security, Information Security, Red team
Topics: Cybersecurity, Information Security, Compliance, CMMC
Now Open: The FCC’s Schools and Libraries Cybersecurity Pilot Program
The FCC’s Schools and Libraries Cybersecurity Pilot program is now open for FCC Form 484 Part 1and we’d like to take a moment to help qualifying organizationsget the most bang from their submission.
Topics: Cybersecurity, Information Security, Data Protection, Penetration Testing, Incident Response, Monitoring, MXDR
Staying Vigilant Against Cyber Threats in Healthcare
Recently, the American Hospital Association warned that Black Basta, a known ransomware group, would be accelerating attacks within the healthcare sector. The group gained notoriety for their sophisticated attack methods and high-profile targets and typically operates by infiltrating a network, exfiltrating sensitive data, and then encrypting the victim's files.
Healthcare organizations can stay vigilant against threat actors by adopting a comprehensive cybersecurity strategy that incorporates regular testing and 24/7 monitoring. ProCircular also recommends the following:
Topics: Cybersecurity, Network Security, Data Breach, Information Security, Data Security, Data Protection, Security Awareness Training, healthcare, hacking, Passwords, risk, Ransomware
QR Code Scams: How to Help Your Employees Avoid Them
We've all become familiar with QR codes — those square bar codes that seem to be everywhere. You scan them with your phone camera and they take you directly to a website. QR codes are an incredibly convenient way to access information, but scammers are clever and already use them as part of their scam arsenal. Fortunately, everyone can protect themselves from QR scams by learning how they work and remaining vigilant.
Topics: Cybersecurity, Network Security, Information Security, Data Security, Data Protection, risk