Cyber Security

insider threat
Primers

The Call From Inside the House: Understanding and Preventing Insider Threat

Insider threats pose significant risks to organizations of all sizes but are unfortunately often overlooked or misunderstood by security teams. These threats come from individuals with access to an organization...

storm
Malware Spotlight

The Eye of the Storm: Malware in Focus

In June 2023, a Federal Civilian Executive Branch (FCEB) agency in the United States uncovered unusual email behavior, subsequently revealing a fresh espionage campaign connected to China. A month later, on Jul...

July NL-2
Monthly Newsletter

Consortium Networks’ Monthly Newsletter: July

Welcome back to the Consortium Networks monthly newsletter, now sent out on Monday. Hopefully, this change will help out with clearing out that inbox ahead of the weekend! Let us know what you think. Th...

MoveIT 2
News & Events

MOVEit Zero-Day Explainer Update

Article Update: Since the initial disclosure of the MOVEit zero-day vulnerability, the situation has evolved with significant updates and revelations surrounding the exploitation and the widespread impact of th...

AG
Policy Explainer

This is Why We Can’t Have Nice Things

The Best Day March 3rd, 2023, was an exciting day in the cybersecurity regulatory space. A memo released by the Environmental Protection Agency (EPA) marked the first federal mandatory cyber regulation outsi...

barracuda
Malware Spotlight

Malware in Focus: Barracuda

The Barracuda Software company reported that their ESG (Email Security Gateway) software has been actively exploited since October 2022. This exploitation primarily affects versions 5.1.3001 through 9.2.0.006. ...

city gov
Risk Management

The State of Cybersecurity: Local Governments

The City of Dallas fell victim to a crippling ransomware attack on May 3rd, an event which it has only recently recovered from well over a month later. At its worst, the attack impacted a wide variety of city s...

moveit
News & Events

MOVEit Zero-Day Explained

When an application or service that an organization relies on develops an unknown security flaw, the risks of cyberattacks rise dramatically. Hackers exploit these vulnerabilities, known as zero-days, to access...

June Newsletter-2
Monthly Newsletter

Consortium Networks’ Monthly Newsletter: June

Consortium Networks has had a great kick-off to the Summer with many work-iversaries and other celebrations to kick off June. In addition, our powerhouse team of interns have settled in well and have been absol...

Untitled design-13
Platforms & Solutions

AI Integration with Security Platforms

AI has been and continues to be one of– if not the– hottest topic of conversation in tech circles and beyond and cybersecurity is no exception.  Recorded Future kicked off the revolution by integrating ...