Latest Cyber Threat Intelligence Report

Cyber Threat Intelligence Report – June 2023

The DeepSeas crew recently published their cyber threat intelligence monthly report. As a client of DeepSeas, you can have the earliest access to these vital reports before they are published, as well as customized cyber threat intelligence reports tailored to your specific needs. Schedule a virtual consultation with the  DeepSeas

Read More
Social Engineering by DeepSeas RED

Social Engineering Solutions by DeepSeas RED

What is social engineering, and why is it important to use solutions from DeepSeas RED?  Social engineering is a cyber security attack which uses deception via social engagement to convince your team to provide confidential information. To catch a cyber criminal, you must think like one. As part of social

Read More
Mobile Application Penetration Testing by DeepSeas

Mobile Application Penetration Testing by DeepSeas RED

Why is it important to use mobile application penetration testing from DeepSeas RED?  Due to the large volume of data processed through mobile applications, they are a prime target for cyber attacks. Because new vulnerabilities are found daily, organizations must be proactive in ensuring their mobile app is safe from

Read More
Advanced Adversary Simulation by DeepSeas RED

Advanced Adversary Simulation by DeepSeas RED

Why is it important to use an advanced adversary simulation from DeepSeas RED?  Advanced adversary simulation by DeepSeas RED is a next-level, remote engagement designed to examine your organization’s security tool suite installation, monitoring, and maintenance. The simulation tests your organization’s preparedness to combat and detect real-world attacks on the

Read More
Wireless Penetration Testing by DeepSeas

Wireless Penetration Testing by DeepSeas RED

Why is it important to use wireless penetration testing from DeepSeas RED?  A modern and secure wireless network needs to be user-friendly and handle your organization’s business demands while balancing cybersecurity with productivity to keep your business operating securely. By performing wireless penetration testing with DeepSeas RED, your organization can

Read More
Active Directory Vulnerability Assessment by DeepSeas

Active Directory Vulnerability Assessment by DeepSeas RED

Why is it important to take an Active Directory Vulnerability Assessment from DeepSeas RED?  Microsoft’s Active Directory (AD) serves as the cornerstone of most organization’s identity and access management systems. Ensuring its security is vital for:  Identity protection: Safeguarding user accounts and credentials from unauthorized access and threats  Operational integrity:

Read More
Physical Vulnerability Assessment by DeepSeas

Physical Vulnerability Assessment by DeepSeas RED

Why is it important to take a Physical Vulnerability Assessment from DeepSeas RED?  While digital threats have surged in today’s modern world, the importance of safeguarding tangible assets cannot be understated. Physical vulnerability assessments play a pivotal role in:  Asset protection: Ensure the safety of your tangible assets, ranging from

Read More
Network Vulnerability Assessment by DeepSeas

Network Vulnerability Assessment by DeepSeas RED

Why is it important to leverage a Network Vulnerability Assessment from DeepSeas RED?  In an era where cyber threats are constantly evolving, the safety and security of an organization’s network infrastructure are paramount. Network vulnerability assessments are critical for several reasons: Proactive defense: Identify and rectify weaknesses before attackers can

Read More
Physical penetration testing by DeepSeas RED

Physical Penetration Testing by DeepSeas RED

Why is it important to use physical penetration testing from DeepSeas RED?  While many businesses do an excellent job of protecting their network and applications against the threat of a virtual cyber-attack, many organizations don’t consider the risk associated with a possible physical attack on their locations. As a cybersecurity

Read More
Application Programming Interface (API) penetration testing by DeepSeas RED

API Penetration Testing by DeepSeas RED

Why is it important to use Application Programming Interface (API) penetration testing from DeepSeas RED?  More and more companies are exposing APIs to their customers directly, for their applications to call to obtain information and present it to users in a consolidated manner.  Any time these APIs are exposed, it

Read More
Red Team Engagements by DeepSeas RED

Red Team Engagements by DeepSeas

Why is it important to use DeepSeas RED for red teaming?  It is crucial that your organization not only prevent security threats but can also identify and neutralize threats that have successfully infiltrated their environment. Red team testing allows you to baseline your organization’s readiness and security controls against an

Read More
Web Application Penetration Testing by DeepSeas

Web Application Penetration Testing by DeepSeas RED

Why is it important for your organization to use web application penetration testing by DeepSeas RED? Companies rely on web applications, application programming interfaces (APIs) and mobile applications to conduct daily business more than ever. That includes customer-facing applications with functionality to perform automated activities that often use sensitive data,

Read More
Network penetration testing by DeepSeas

Network Penetration Testing by DeepSeas RED

Why is it important to use the network penetration testing by DeepSeas RED?   As technology advances, the methods cyber criminals use to exploit weaknesses in an operating system or network also evolve. Some examples of these flaws include social engineering attacks, SQL injection, outdated versions of software, poorly configured firewalls,

Read More
DeepSeas Threat Recon Expert Warren Perez

Meet Threat Recon Expert at DeepSeas, Warren Perez

In our “Meet Our Deeps” series, Warren Perez, Threat Recon Unit and Special Projects Leader at DeepSeas, shares insights on leveraging experience and continuous education to enhance cyber defense, emphasizing the importance of listening to feedback for improvement.

Read More
Managed Detection & Response for Operational Technology DeepSeas MDR+

MDR for OT: DeepSeas Covers Operational Technology

As the reliance on Operational Technology (OT) and Industrial Control Systems (ICS) grows within critical industries, the need for robust MDR for OT is becoming increasingly important. Let’s dive into the details of understanding OT, the role of ICS, and how DeepSeas MDR+ is serving as the go-to Managed Detection

Read More
Nozomi DeepSeas OT security and compliance

Navigating NDAA Section 1505 with Nozomi Networks & DeepSeas

Let’s embark on your journey through the process of obtaining and maintaining NDAA Section 1505 compliance with Nozomi Networks leading the way and DeepSeas enhancing the journey with an outcomes-based approach. NDAA Section 1505 Compliance – Start Here The starting point is understanding the requirements of the law, a crucial

Read More
cybersecurity expertise and AI risk thought leadership

Timothy Haugh at the Helm: The Future of U.S. Cyber Command and NSA

Lt. Gen. Timothy Haugh is well-equipped with proven leadership

These changes and potential challenges paint a picture of what we can expect under Haugh’s leadership. But the reality is, cybersecurity is a complex and ever-evolving field. It’s like trying to hit a moving target. Haugh’s ability to adapt and respond to emerging threats, policy changes, and resource constraints will be the true test of his leadership. But given his track record, it seems he’s well-equipped for the task.

Read More
Analysis of latest cyber threats

Analysis of DeepSeas Cyber Threat Intelligence Rollup

I’m going to take a look at the DeepSeas Cyber Threat Intelligence report from May 2023 through the lens of what I call, “The Good, The Bad, The Ugly and The Unexpected.” Shout-out to our partner Sentinel One who does a similar take on weekly threat intel. My fellow Deeps just

Read More
Latest Cyber Threat Intelligence Report

Cyber Threat Intelligence Report – May 2023

 The DeepSeas crew recently published their cyber threat intelligence monthly report. As a client of DeepSeas, you can have the earliest access to these vital reports before they are published, as well as customized cyber threat intelligence reports tailored to your specific needs. Schedule a virtual consultation with the  DeepSeas

Read More
Analysis of latest cyber threats

MalasLocker is a Novel Twist on Ransomware Tactics

MalasLocker is a novel ransomware operation that has been active since the end of March 2023. It targets Zimbra servers, exfiltrating email data and encrypting files. Unlike traditional ransomware, MalasLocker doesn’t demand a direct ransom payment but requires the victim to make a donation to an approved non-profit charity. They

Read More
Analysis of latest cyber threats

Volt Typhoon and the Importance of Proactive Cyber Defense

In the ever-evolving landscape of cyber threats, a new storm is brewing. The state-sponsored actor, Volt Typhoon, has been quietly infiltrating critical infrastructure organizations in the United States since mid-2021. This group, based in China, is known for its stealthy techniques and focus on espionage and information gathering. Their modus

Read More

APT28 Potentially Exploiting MOVEit Zero Day

The DeepSeas cyber threat intelligence crew has observed exploitation of a zero-day exploit in US-based Progress’s MOVEit Managed File Transfer Software service. Further investigation by DeepSeas has uncovered a possible overlap with infrastructure known to be operated by the Russian state-aligned advanced persistent threat group Fancy Bear (aka APT28). Whether

Read More
Analysis of latest cyber threats

Cloud to Firmware Exploitation Revealed by Otorio’s Research

The Cloud to Firmware exploitation revealed by Otorio’s Research can be viewed as a chain in the same way so many cybersecurity events are described, showing that a cybersecurity program’s strength is often determined by its weakest link. In the case at hand, the links are represented by a collection

Read More

April 2023 Cyber Threat Intelligence Rollup by DeepSeas

Are you keeping a keen eye on the latest threat intel? The DeepSeas cyber threat intelligence crew published the April 2023 Cyber Threat Intelligence Rollup. Remember, DeepSeas clients always get the earliest look at these vital reports before they’re published, as well as dedicated reports tailored to their needs. Consider

Read More
DeepSeas Cyber Threat Intelligence Rollup image

Cyber Threat Intelligence Monthly Rollup by DeepSeas | March 23

Always keeping an eye on the latest cyber threat intelligence, DeepSeas is pleased to share our March 2023 Threat Intelligence Report. This comprehensive report is packed with critical updates on the most significant stories and developments from the month. In the March 2023 rollup, we have some good news and

Read More
MDR+ by DeepSeas Managed Detection & Response image

DeapSeas MDR+

Discover what your MDR vendor isn’t giving you. Explore DeepSeas Managed Detection & Response. Get DeepSeas MDR+ Is your MDR provider delivering on its promises? If you have experience with Managed Detection & Response, you know what you need in your MDR provider: proactive and effective cyber defense support. Business

Read More

Transforming a Cybersecurity Program: Top 5 Best Practices

The utilization of effective cyber defense tools and techniques – including best practices for building a cybersecurity program – were recently covered in an episode of Cybersecurity America with our own Deeps, Josh Nicholson and Michael Kennemer, Industrial Control Systems & Platform Security Engineer at DeepSeas. Below are top five

Read More

Meet Cybersecurity Engineer, Hannah Thompson

As part of a series called “Meet our Deeps,” we introduce you to Hannah Thompson, a cybersecurity engineer at DeepSeas. Let’s dive in to learn more about Hannah’s work and career. Q: Hi, Hannah. Can you tell us more about your current role as a cybersecurity engineer at DeepSeas? A: I

Read More

Meet Cybersecurity Data Quality Manager, Carmen Silva

As part of a “Meet our Deeps” series, we introduce you to Carmen Silva, a cybersecurity data quality manager at DeepSeas. Let’s dive in to learn more about Carmen’s work and career. Q: Hi, Carmen. Can you tell us what you enjoy most about your work as a Cybersecurity Data Quality

Read More

The Best Threat Intelligence Programs Answer these 3 Questions

Questions related to how security leaders can create the best threat intelligence programs for their organizations were recently covered in an episode of Cybersecurity America with Josh Nicholson. While there are many questions an organization should address when adopting a threat intelligence program, below are three of the many that

Read More
SOC alert prioritization

SOC Alert Prioritization & Potential Hidden Risks

Some security leaders have had SOC alert prioritization decisions made for them. Others are dealing with decisions that were made so long ago, no one remembers how they came to be. While other leaders feel certain in their decisions — e.g. “I measure our reduction in false positives.” — these

Read More

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly A DeepSeas Summary DeepSeas has identified a new technique involving the use of OneNote files in malware delivery, though activity of this nature was observed to have accelerated among cybercriminal groups in December 2022. The use of this new filetype has

Read More
DeepSeas cyber defense finds Linux Kernel ksmbd Use-After-Free Vulnerability

Linux Kernel ksmbd Use-After-Free Vulnerability

Summary: On 22 December 2022, a potential Remote Code Execution (RCE) vulnerability in Linux Kernel versions 5.15 – 5.18.x / 5.19.x which affects Linux Kernel products with ksmbd enabled. According to Zero Day Initiative, the vulnerability could allow remote attackers to execute arbitrary code on affected installations and authentication is

Read More

Two Mighty Forces in Cyber Defense Unite to Form DeepSeas

By Chris Esemplare, CEO at DeepSeas In the cybersecurity market, DeepSeas is a new name, but it’s not a startup. Rather, it’s the unification of two mighty forces in cyber defense: Booz Allen Hamilton’s commercial Managed Threat Services business and Security On-Demand. I am excited by the potential of combining

Read More

Join our Team

21% of the DeepSeas crew are Veterans or Active Military Reservists. Join our talented crew of cyber experts.

Join Our Deep Partnership Ecosystem