Redscan, A Kroll Business (@redscan) 's Twitter Profile
Redscan, A Kroll Business

@redscan

MDR | PEN TESTING | RED TEAMING | INCIDENT RESPONSE

Now part of @KrollWire

#cybersecurity

ID: 19727430

linkhttp://www.redscan.com calendar_today29-01-2009 19:11:30

5,5K Tweet

2,2K Followers

1,1K Following

Kroll (@krollwire) 's Twitter Profile Photo

Purple teaming can play a vital role in helping organizations defend against #cyberthreats by maximizing the impact of red and blue teams through continuous collaboration. Learn more about how it could benefit your business here: ms.spr.ly/6011Y2rmb

Purple teaming can play a vital role in helping organizations defend against #cyberthreats by maximizing the impact of red and blue teams through continuous collaboration. 
 
Learn more about how it could benefit your business here: ms.spr.ly/6011Y2rmb
Kroll (@krollwire) 's Twitter Profile Photo

Tiernan Connolly has joined the Kroll Cyber Risk team to lead the Security Advisory business in EMEA. Get in touch if you need support with implementing and designing forward-thinking cybersecurity programs: ms.spr.ly/6013Y2rST

Tiernan Connolly has joined the Kroll Cyber Risk team to lead the Security Advisory business in EMEA. Get in touch if you need support with implementing and designing forward-thinking cybersecurity programs: ms.spr.ly/6013Y2rST
Kroll (@krollwire) 's Twitter Profile Photo

Businesses are increasingly recognizing the advantages of adopting a more flexible, scalable approach to #cybersecurity through Security as a Service (SECaaS). Check out our latest blog for more info on the #SECaaS model: ms.spr.ly/6015Yf0Il

Businesses are increasingly recognizing the advantages of adopting a more flexible, scalable approach to #cybersecurity through Security as a Service (SECaaS).
 
Check out our latest blog for more info on the #SECaaS model: ms.spr.ly/6015Yf0Il
Kroll (@krollwire) 's Twitter Profile Photo

Each week our cyber threat intelligence team reports on the latest trends they observe from the trenches. Watch the full briefing here: ms.spr.ly/6017YA5pN

Kroll (@krollwire) 's Twitter Profile Photo

As Microsoft solutions constantly evolve, monitoring various configurations and settings is challenging and mistakes can lead to exposure. We’ve brought together a set of practical assessments to protect your organization and its Microsoft investments: ms.spr.ly/6017YfFcc

As Microsoft solutions constantly evolve, monitoring various configurations and settings is challenging and mistakes can lead to exposure. We’ve brought together a set of practical assessments to protect your organization and its Microsoft investments: ms.spr.ly/6017YfFcc
Redscan, A Kroll Business (@redscan) 's Twitter Profile Photo

AI security risks continue to evolve, presenting significant challenges for all organisations. Kroll’s new AI insights hub explores some of these trending #AI challenges. Check it out for the latest #AISecurity insights💡bit.ly/3L3koxc

Kroll (@krollwire) 's Twitter Profile Photo

Our threat intelligence team recently discovered a campaign with a complex infection chain to deliver IDATLOADER. It included some novel tricks for obfuscation, including HTA files and BPL side-loading. Read more on our findings: ms.spr.ly/6016YCrJq #threatintel

Our threat intelligence team recently discovered a campaign with a complex infection chain to deliver IDATLOADER. It included some novel tricks for obfuscation, including HTA files and BPL side-loading. Read more on our findings: ms.spr.ly/6016YCrJq #threatintel
Kroll (@krollwire) 's Twitter Profile Photo

Kroll and VotingWorks partnered in penetration testing its flagship tool, Arlo. Read more here: ms.spr.ly/6019lBSYf #electionsecurity

Kroll and VotingWorks partnered in penetration testing its flagship tool, Arlo. Read more here: ms.spr.ly/6019lBSYf #electionsecurity
Kroll (@krollwire) 's Twitter Profile Photo

Are you prepared for the Digital Operational Resilience Act (DORA)? The deadline for this new regulation is January 17th. Learn more about the core aspects of the regulation, key recommendations and steps to take now: ms.spr.ly/6013lDtQR

Are you prepared for the Digital Operational Resilience Act (DORA)? The deadline for this new regulation is January 17th. 

Learn more about the core aspects of the regulation, key recommendations and steps to take now: ms.spr.ly/6013lDtQR
Kroll (@krollwire) 's Twitter Profile Photo

Citrix Bleed (CVE-2023-4966) highlighted a buffer overflow in Citrix NetScaler ADC and Gateway, a flaw that could leak sensitive info and allow session "hijacking". Read what we've found on our deep dive with one of the users, the PLAY Ransomware Group: ms.spr.ly/6016lH4mp

Citrix Bleed (CVE-2023-4966) highlighted a buffer overflow in Citrix NetScaler ADC and Gateway, a flaw that could leak sensitive info and allow session "hijacking". Read what we've found on our deep dive with one of the users, the PLAY Ransomware Group: ms.spr.ly/6016lH4mp
Kroll (@krollwire) 's Twitter Profile Photo

Catch our exclusive briefing on the State of Cyber Defense: Manufacturing Cyber Resilience, where Kroll experts will share insights and analysis on the specific security challenges facing the manufacturing sector: ms.spr.ly/6014lJaMG

Catch our exclusive briefing on the State of Cyber Defense: Manufacturing Cyber Resilience, where Kroll experts will share insights and analysis on the specific security challenges facing the manufacturing sector: ms.spr.ly/6014lJaMG
Kroll (@krollwire) 's Twitter Profile Photo

Our threat intel team looks into CLEARFAKE, the malicious in-browser JavaScript framework deployed on compromised webpages to deliver information stealers. Read more here: ms.spr.ly/6018lK2aG

Our threat intel team looks into CLEARFAKE, the malicious in-browser JavaScript framework deployed on compromised webpages to deliver information stealers. Read more here: ms.spr.ly/6018lK2aG
Kroll (@krollwire) 's Twitter Profile Photo

We're thrilled to be recognized by the OWASP on its Software Assurance Maturity Model (SAMM) practitioners list. This inclusion highlights our commitment to continue improving the software security posture of our client organizations: ms.spr.ly/6012lzvv8

Kroll (@krollwire) 's Twitter Profile Photo

Dave Burg, Kroll's Global Head of Cyber Risk, speaks on the recent #CrowdStrike global technology outage and implications for businesses with Sonali Basak and Scarlet Fu via Bloomberg TV: ms.spr.ly/6014lpvtG #globaltechoutage

Kroll (@krollwire) 's Twitter Profile Photo

Our offensive security team has been working closely with the maintainers of the TorchServe project and AWS to correct two vulnerabilities that could compromise AI infrastructure. Read more in the blog: ms.spr.ly/6016ljPN8 #AISecurity #AIIntegrity #AIVulnerability

Our offensive security team has been working closely with the maintainers of the TorchServe project and AWS to correct two vulnerabilities that could compromise AI infrastructure. Read more in the blog: ms.spr.ly/6016ljPN8

#AISecurity #AIIntegrity #AIVulnerability
Kroll (@krollwire) 's Twitter Profile Photo

The recent CrowdStrike incident sent shockwaves across the world, giving us a glimpse into the systemic cyber risk faced by businesses today. Tiernan Connolly discusses this systemic risk in the context of upcoming regulatory changes with DORA and NIS2: ms.spr.ly/6010lYhX0

The recent CrowdStrike incident sent shockwaves across the world, giving us a glimpse into the systemic cyber risk faced by businesses today. Tiernan Connolly discusses this systemic risk in the context of upcoming regulatory changes with DORA and NIS2: ms.spr.ly/6010lYhX0
Kroll (@krollwire) 's Twitter Profile Photo

📰 Dan Rice joins Kroll to expand AI capabilities and support clients grappling with AI data governance, compliance and risk! Read more on Kroll's AI Risk Consulting Services: ms.spr.ly/6013l4PAx

📰 Dan Rice joins Kroll to expand AI capabilities and support clients grappling with AI data governance, compliance and risk! Read more on Kroll's AI Risk Consulting Services: ms.spr.ly/6013l4PAx
Kroll (@krollwire) 's Twitter Profile Photo

Our cyber risk experts in the offensive security team have been testing AI infrastructure! They’ve found vulnerabilities in AI systems with leading #GenAI providers and discovered that prompt injection is rife. Find out more in our exclusive briefing: ms.spr.ly/6012m8G9e

Our cyber risk experts in the offensive security team have been testing AI infrastructure! They’ve found vulnerabilities in AI systems with leading #GenAI providers and discovered that prompt injection is rife. Find out more in our exclusive briefing: ms.spr.ly/6012m8G9e
Kroll (@krollwire) 's Twitter Profile Photo

What is posing the most significant risk to the integrity and confidentiality of your #software systems? Secret Leaks. Find out more on what Secret Leaks are, the security risk they pose and how to deal with them in Kroll's latest blog: ms.spr.ly/6013mKj0L

What is posing the most significant risk to the integrity and confidentiality of your #software systems? Secret Leaks.

Find out more on what Secret Leaks are, the security risk they pose and how to deal with them in Kroll's latest blog: ms.spr.ly/6013mKj0L
Kroll (@krollwire) 's Twitter Profile Photo

Kroll Appoints Katherine Keefe to Lead Global Cyber Insurance Industry Capabilities: ms.spr.ly/6045mhuWT Katherine's deep understanding of the cyber insurance and regulatory landscape is invaluable as Kroll continues to expand its support for insurance clients.

Kroll Appoints Katherine Keefe to Lead Global Cyber Insurance Industry Capabilities: ms.spr.ly/6045mhuWT

Katherine's deep understanding of the cyber insurance and regulatory landscape is invaluable as Kroll continues to expand its support for insurance clients.