Analyzing MITRE’s Top Observed Attacker Techniques
This month, MITRE released their Sightings report, which analyzes and reports on common attacker techniques. MITRE analyzed over 6 million sightings of attacker behavior from April...
Read MoreBlumira Wins Globee® Cyber Security Global Excellence Awards for Startup of the Year and Chief Technology Officer of the Year
Recognition underscores market need for powerful, affordable threat detection and response solutions ANN ARBOR, Mich., MARCH 10, 2022 - Blumira, a leading cybersecurity provider o...
Read MoreDefend Against Russian-Sponsored Cyberattacks
Russian-sponsored threat actors have already distributed cyberattacks via new malware and wiperware such as Cyclops Blink and HermeticWiper. As tensions between Ukraine and Russia ...
Read MoreTop 5 Cybersecurity NFR Licenses For MSPs
You probably wouldn’t buy a car without taking it for a test drive, and MSPs shouldn’t purchase cybersecurity tools without a solid test run, either. Enter a major perk in a...
Read MoreEmail Forwarding Security Risk (And How to Detect)
Email forwarding can be a convenient feature for users — but unfortunately for defenders, it’s even more convenient for threat actors. Email forwarding rules enable an email...
Read More2021 Wrap-Up: Cybersecurity By The Numbers
2021 was a busy year for cybersecurity professionals. An influx of major high-profile ransomware attacks impacted supply chains and even inspired a first-ever presidential executiv...
Read MoreTop Five Cloud Security Threats, Risks, and Challenges in 2023
Moving to the cloud certainly has its benefits -- especially during this new era of remote work. Cloud services offer flexibility and scalability, due to the ability to quickly spi...
Read More5 Cybersecurity Predictions for 2022
Cybersecurity is a fast-moving industry. In 2021 we saw several high-profile ransomware attacks that impacted global supply chains, such as attacks on Colonial Pipeline and JBS. ...
Read MoreDetecting Log4j Exploits Leading to Ransomware
Threat actors have already begun to exploit the Log4j vulnerability to launch ransomware attacks — and unfortunately, it’s just the tip of the iceberg. Conti was the first p...
Read MoreG2’s Winter 2022 Momentum Report: Blumira Leads 4 Categories
This winter, G2 named Blumira a Momentum Leader in four categories — SIEM (security incident and event management), SOAR (security orchestration, automation and response), Incide...
Read More