April 15, 2022
Threat Intel Report | April 2022

With any security posture, visibility is important—knowing your environment, its activity, and where your data resides. But what about your data that lives outside your environment? That is, the data in the hands of companies whose services and tools you use. 

Every organization employs third-party tools, from the largest enterprise to the smallest mom-and-pop shop. In every case, organizations must share data or open up connections with these third-party providers. The recent Lapsus$ hack into Okta was just the latest in a string of high-profile incidents involving third-party providers. 

In this month’s Threat Intel Report, we look at highlights of the recent string of Lapsus$ attacks including Okta; we touch on the importance of third-party risk management; and we update with a summary of the Ukraine war. 

 

Download Threat Intel Report

 

About the Author
CBI, A Converge Company
Threat Intel Group
The Threat Intel Group (TIG) is a critical component of CBI’s Managed Security Services. The TIG’s dedicated team of threat hunters summarize and interpret today’s threats to improve your security posture at scale. Combining globally recognized security methodologies, data and automation with high-level analysis, CBI’s Threat Intel Group provides powerful insights to enhance your organization's security decision-making process. All information is actionable and provides strategic, tactical and operational threat intelligence to raise stakeholders' awareness and embolden proactiveness.
I Need To...