Black Kite Blog
Understand Supply Chain Risk Susceptibility to Prevent New Microsoft Exchange Server Ransomware Attacks
How Black Hat served as a catalyst for the ProxyShell attack, and the latest security updates customers should install for protection.
Aug 27, 2021Ransomware Attacks Against the Fortune 500: Lessons Learned From Accenture
It is not a surprise why a Fortune 500 company such as Accenture entered cybercriminals’ radar. They have a wealth of client data at stake.
Aug 25, 2021T-mobile Hacked 6 Times in Last 4 Years
T-Mobile made yet another appearance on the list of data breach victims, putting the data of over 40 million consumers at risk.
Aug 23, 2021Third-party Data Breaches in July 2021, Revealed: Ransomware Continues Its Reign
Third-party data breaches in July 2021: ransomware continues its reign. Black Kite Research on the four largest supply chain incidents of the month.
Aug 3, 2021Inside the Mind of a Cybercriminal: Common Hacking Methods, Explained
Preventing unrecognized cyber risk requires organizations to understand the signals that suggest suspicious behavior.
Jul 29, 2021Simplifying Vendor Security Assessments, Part Ii: Questions to Ask Along the Road
Simplifying vendor security assessments, Part II: the questions that actually surface third-party risk — and the ones that just generate paperwork.
Jul 21, 2021Simplifying Vendor Risk Assessments, Part I: Designing Your Vra Roadmap
Simplifying vendor risk assessments, Part I: how to design your VRA roadmap in five steps — without the questionnaire bloat that stalls most TPRM programs.
Jul 16, 2021The Top Five Third-party Data Breaches in June 2021, Revealed
Data breaches in June targeted automative manufacturers first, with both Volkswagen and Mercedes-Benz' customer data leaked, impacting millions.
Jul 8, 2021Ransomware Day Strikes Again: What Kaseya Should Teach Us
Ransomware groups are constantly improving their strategy, but these attacks are not brand new, we must become stronger than the bad actors.
Jul 7, 2021The Most Common Cybersecurity Threats Facing Supply Chains in 2021
As we enter the second half of 2021 and reflect back on the previous six months, it’s clear that all eyes are now on supply chain security.
Jun 30, 2021Four Cybersecurity Tips for Navigating to a Hybrid Work Environment
Today's new work model requires new security measures. Keep your organization and your employees safe with these tips for managing a hybrid work model
Jun 16, 2021How to Create an Effective Cyber Incident Response Plan
How to build a working cyber incident response plan: the 5 phases — preparation, detection, containment, analysis, recovery — and what each requires.
Jun 9, 2021