Resource Center

Resource Center

Expert Insights and Tools for Fortifying Your Cyber Defense

Elevate your cybersecurity expertise and strengthen the security posture of your organization with expert guidance, industry best practices, and research insights from Enterprotect.

AWS Exploited for Crypto Mining Operation
Threat Advisory Lee Vaniderstine Threat Advisory Lee Vaniderstine

AWS Exploited for Crypto Mining Operation

Protect your organization from the exploitation of Amazon Web Services (AWS) for illicit crypto mining activities. Learn about the GUI-vil threat group and their unique attack methods. Discover the risks involved and get actionable recommendations from Enterprotect on how to secure your cloud environment effectively.

Read More
Supply Chain Attack Compromises 3CXDesktopApp
Threat Advisory Lee Vaniderstine Threat Advisory Lee Vaniderstine

Supply Chain Attack Compromises 3CXDesktopApp

The compromise of 3CXDesktopApp poses a significant threat to businesses globally, as it has the potential to steal credentials and access sensitive data. Our threat advisory outlines the technical details of the malware, exposure risks, and recommendations to protect your organization from potential breaches. Ensure endpoint protection is installed and active on all endpoints, remove any exclusions related to 3CX, and regularly remind users not to store login credentials in their browsers.

Read More