BianLian Data Extortion Group – Updated Advisory

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have released a joint Cybersecurity Advisory detailing the tactics, techniques, and procedures (TTPs) of the BianLian ransomware and data extortion group. This advisory, updated as of November 20, 2024, provides critical…

Read More

Are You Using M365 Co-pilot? Beware of Missing Logs and Hidden Costs

Leveraging M365 Co-pilot’s AI capabilities can be transformative for organizations, but recent insights underscore that logging and auditing around Co-pilot aren’t just optional—they’re crucial for maintaining security, compliance, and enabling effective digital forensics. According to Microsoft’s documentation, M365 Co-pilot and its associated services do not automatically enable comprehensive logging by default. This poses critical concerns…

Read More

RTM – Remote Monitoring & Management (RMM) Tools

Topic: Ransomware Tool Matrix Focus: Remote Monitoring & Management (RMM) Tools An RMM (Remote Monitoring and Management) tool is a type of software used by IT professionals and managed service providers (MSPs) to remotely monitor, manage, and maintain IT systems, networks, and devices. These tools are designed to improve the efficiency of IT operations by…

Read More

REMCOS Remote Control & Surveillance Software

What Is Remcos? aka: RemcosRAT, Remvio, Socmer Actor(s): APT33, The Gorgon Group, UAC-0050 Remcos (short for Remote Control and Surveillance) is a commercial system administration application for XP and newer versions of Windows that threat actors have weaponized. Remcos is a closed-source application designed for network maintenance, system monitoring, surveillance, and penetration testing, but attackers use it to…

Read More

How to Disable Windows CoPilot: A Step-by-Step Guide

Windows CoPilot is Microsoft’s latest AI-powered assistant, integrated directly into Windows 11. It’s designed to help users by providing personalized suggestions, enhancing productivity, and simplifying tasks. While this feature can be beneficial for many, some users find it unnecessary, intrusive, or even a potential privacy concern. If you’re one of those users who prefers not…

Read More

Start The New Year Off The Right Way

It’s our job at Barricade Cyber Solutions to make sure that your data is safe at all times – and we make this happen through a proactive mindset. We address issues before cybercriminals can find vulnerabilities and, by doing that, we keep your business safe.    The cybercrime industry is evolving all the time, so…

Read More

Recover Your Data And Your Trust

While it’s true that cyberattacks are stressful, it’s very likely that you won’t be aware of the attack until after it’s over. Days, weeks, or even months might pass before you realize your company was the victim of a security breach. If the damage is already done, you might feel like the problem is out…

Read More

Did You Fall Victim to a Cyber Attack Over the Holidays?

If your business fell victim to a cyberattack over the holidays, you are far from alone. Unfortunately, the holidays are a very common time for cybercriminals to strike.  In this article, we’ll get into the reasons why cybercriminals are most active around the holiday season, along with steps to take if you were targeted.   …

Read More

How To Recognize Malware

Malware can steal, encrypt, or delete sensitive data, and it can also alter or hijack certain functions of the computer in order to monitor the computer’s activity – even if the victim isn’t aware of it.  As time goes on, malware attacks continue to get more sophisticated. Many use a command-and-control server so cybercriminals can…

Read More

What Is Considered Insider Threat?

An insider threat includes any malicious activity that comes from within – from users that have access to an organization’s network, their applications, or their databases. The users might be current employees, former employees, or even third parties like partners, contractors, or temporary workers. All they need is access to the organization’s physical or digital…

Read More