The State of Cyber
monthly newsletter
Latest updates on the critical issues in cybersecurity.
Sort By
THE FUTURE OF SECURITY NOW: BEHAVIORAL DETECTION
There is nothing static about the world of cybersecurity. Threat actors have progressed by…
ESXI ON MY MIND: DEFENDING ONE OF RANSOMWARE’S NEW FAVORITE TARGETS
Ransomware groups on the rise are expanding their targets and evolving their tactics to…
BACK IN BLACK: BLACKBASTA RANSOMWARE ON THE RISE
Don’t let this new ransomware group fade your business to black. BlackBasta, a ransomware…
ACCOUNT AUDITING
This month’s main topic may seem basic, but it is incredibly impactful. In the…
YOU PLAY LIKE YOU PRACTICE
If someone asked your IT teams how they would respond to an incident and…
HINDSIGHT IS 20/20
Log management is a critical component of any organization’s security posture and should be…
Mastering the Kill Chain—Step Seven: Actions on Objectives
By: Danielle Wallace and Adam Harrison Let’s face it – we’re spending most of…
White Rabbit Continued: Sardonic and F5
In December 2021, Lodestone published an article linking a previously unknown ransomware group, White…
Mastering the Kill Chain—Step Six: Command and Control
By: Danielle Wallace and Josh Sudbury As 80s synth-pop darlings Tears for Fears famously…
White Rabbit Ransomware and the F5 Backdoor
On December 14, 2021, the Lodestone Forensic Investigations team responded to a client whose…
Mastering the Kill Chain—Step Five: Installation
“We’re in.” This line, one of the favorite cliches of hacking in Hollywood, is…
Mastering the Kill Chain—Step Four: Exploitation
Knock, knock, open up the door – it’s real! While DMX is unlikely to…
SUBSCRIBE BELOW
Connect With Us
320 East Main Street
Lewisville, TX 75057
203.307.4984