Skip to main content

BLOGS

DATA BREACH RESOURCES

Threat Actors’ Obsession with Veeam Backups

| Data Breach Resources | No Comments
Threat actors are now deliberately targeting Veeam backup infrastructure to exfiltrate sensitive data before executing broader attacks. For years, Veeam Backup & Replication has quietly supported business continuity across enterprises…

Supply Chain Attacks in Healthcare Are a Growing Cybersecurity Threat

| Data Breach Resources | No Comments
Supply Chain Attacks in Healthcare Are a Growing Cybersecurity Threat As supply Chain Attacks are continuing to affect Hospitals and healthcare organizations across the U.S.  Cyber Centaurs is uniquely positioned…

Guarding Against Midnight Blizzard’s New RDP Tactics

| Data Breach Resources | No Comments
As cyber threat actors continually refine their techniques, state-sponsored groups are pushing boundaries to infiltrate even the most secure networks. Among these groups, Midnight Blizzard—also known as APT29 or Cozy…

DIGITAL FORENSICS RESOURCES

The Truth About Deleted Data and Modern Technology

| Digital Forensics Resources | No Comments
Across the field of digital forensics, one myth persists with remarkable tenacity: the belief that deleted data is never really gone. This notion, popularized by crime dramas and media portrayals,…

Detecting Deepfakes in Legal Cases

| Digital Forensics Resources | No Comments
Why Deepfakes Matter to Lawyers In the rapidly evolving digital landscape, few technologies pose as significant a challenge to legal professionals as deepfakes. These AI-generated videos, images, or audio files…

THREAT ACTOR DOSSIER

FOG Threat Actor Dossier

| Threat Actor Dossier | No Comments
The FOG threat actor group, first identified by Arctic Wolf researchers on May 2, 2024, represents a distinctive strain within the larger ecosystem of ransomware operations. While sharing similarities with…

PENETRATION TESTING

Understanding Remote Access Trojans (RATs)

| Penetration Testing | No Comments
Understanding RATs In the dynamic landscape of cybersecurity, the Remote Access Trojan (RAT) emerges as an enduring and sophisticated menace. Functioning as a specialized form of malware, RATs excel in…

Using Penetration Testing to Stop a New Stealth Breed of Ransomware Attacks

| Penetration Testing | No Comments
Ransomware is arguably one of the most insidious and damaging forms of malware. Cybercriminals are continually exploiting newer methods to circumvent strategies by enterprises to thwart ransomware attacks. A recent…

LEGAL ANALYSIS