<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Threat Landscape on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/categories/threat-landscape/</link><description>Recent content in Threat Landscape on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 29 Jan 2026 17:00:00 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/categories/threat-landscape/index.xml" rel="self" type="application/rss+xml"/><item><title>MITRE D3FEND Framework: Complete Guide for Defensive Security</title><link>https://bsg.tech/blog/mitre-d3fend/</link><pubDate>Thu, 29 Jan 2026 17:00:00 +0000</pubDate><guid>https://bsg.tech/blog/mitre-d3fend/</guid><description>&lt;p&gt;MITRE D3FEND is a knowledge graph of cyber&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security&lt;/a&gt; countermeasures that gives defenders a structured way to select, organize, and communicate defensive techniques. While &lt;a href="https://attack.mitre.org/"&gt;MITRE ATT&amp;amp;CK&lt;/a&gt; catalogs how adversaries attack, D3FEND answers the follow-up question every blue team asks: what exactly should we do about it?&lt;/p&gt;</description></item><item><title>EUVD Database: Europe’s CVE Alternative Explained | BSG</title><link>https://bsg.tech/blog/euvd-europes-answer-to-cve-instability/</link><pubDate>Wed, 14 May 2025 11:11:06 +0000</pubDate><guid>https://bsg.tech/blog/euvd-europes-answer-to-cve-instability/</guid><description>&lt;p&gt;As the MITRE-run CVE program faces operational challenges, Europe has quietly launched a significant alternative. The &lt;strong&gt;European Vulnerability Database (EUVD)&lt;/strong&gt;, developed by ENISA, officially went live in April 2025.&lt;/p&gt;
&lt;p&gt;Though some viewed it as a reaction to MITRE’s instability, the EUVD was long in the making. Its creation was mandated under the &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555"&gt;&lt;strong&gt;NIS2 Directive&lt;/strong&gt;&lt;/a&gt; (Articles 62–63), adopted in 2022, which required ENISA to develop a vulnerability database serving the EU digital ecosystem.&lt;/p&gt;</description></item><item><title>Cyber Incident Response Plan for Small Business [2025]</title><link>https://bsg.tech/blog/cyber-incident-response-tips-for-small-businesses/</link><pubDate>Sat, 03 May 2025 16:06:58 +0000</pubDate><guid>https://bsg.tech/blog/cyber-incident-response-tips-for-small-businesses/</guid><description>&lt;p&gt;In today’s volatile cyber landscape, even small businesses are not immune to disruptive cyberattacks. Ransomware, phishing, and data breaches increasingly target companies of all sizes, and the ability to respond effectively can mean the difference between recovery and ruin. Interestingly, a valuable resource developed for UK local governments offers practical lessons for the private sector: the Local Government Association’s “Cyber Incident Grab Bag.”&lt;/p&gt;</description></item><item><title>CVE Under Threat: What You Need to Know</title><link>https://bsg.tech/blog/cve-under-threat-what-you-need-to-know/</link><pubDate>Wed, 16 Apr 2025 17:01:36 +0000</pubDate><guid>https://bsg.tech/blog/cve-under-threat-what-you-need-to-know/</guid><description>&lt;p&gt;The &lt;strong&gt;Common Vulnerabilities and Exposures (CVE)&lt;/strong&gt; program is one of the most critical pillars of modern cybersecurity. Without it, organizations around the world would struggle to identify, track, and prioritize vulnerabilities in software and hardware. But as of &lt;strong&gt;April 16, 2025&lt;/strong&gt;, this essential system is facing a major disruption: the expiration of MITRE’s federal contract to operate the CVE program. Here’s what’s happening—and why you should care.&lt;/p&gt;</description></item><item><title>Preventing Crypto Exchange Hacks: Lessons from Bybit Heist</title><link>https://bsg.tech/blog/preventing-crypto-exchange-hacks-lessons-from-bybit-heist/</link><pubDate>Wed, 26 Feb 2025 11:27:46 +0000</pubDate><guid>https://bsg.tech/blog/preventing-crypto-exchange-hacks-lessons-from-bybit-heist/</guid><description>&lt;p&gt;Bybit, a cryptocurrency exchange, &lt;a href="https://announcements.bybit.com/article/incident-update---eth-cold-wallet-incident-blt292c0454d26e9140/"&gt;recently suffered one of the largest crypto thefts in history&lt;/a&gt;, with attackers making off with $1.4 billion. The attack, attributed to North Korean cybercriminals, exploited vulnerabilities in Bybit’s security processes, leveraging malware and social engineering to bypass multi-signature protections. This blog post breaks down how the attack occurred, the techniques used by the attackers, and lessons for the crypto industry.&lt;/p&gt;</description></item><item><title>Cyber Kill Chain &amp; MITRE ATT&amp;CK Defense Guide | BSG</title><link>https://bsg.tech/blog/cyber-defense-using-cyber-kill-chain-and-mitre-attck-explained/</link><pubDate>Thu, 06 Feb 2025 15:41:48 +0000</pubDate><guid>https://bsg.tech/blog/cyber-defense-using-cyber-kill-chain-and-mitre-attck-explained/</guid><description>&lt;p&gt;In today’s threat landscape, cyberattacks are more sophisticated and persistent than ever. Organizations need structured approaches to detect, analyze, and respond to threats effectively. Two critical frameworks that have shaped modern cyber&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security&lt;/a&gt; defense are the &lt;strong&gt;&lt;a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html"&gt;Cyber Kill Chain&lt;/a&gt;&lt;/strong&gt; and the &lt;strong&gt;&lt;a href="https://attack.mitre.org/"&gt;MITRE ATT&amp;amp;CK Framework&lt;/a&gt;&lt;/strong&gt;. Understanding these models can significantly improve threat detection, incident response, and overall cybersecurity resilience.&lt;/p&gt;</description></item><item><title>2024’s Worst Cyberattacks: Security Lessons &amp; Tips | BSG</title><link>https://bsg.tech/blog/lessons-from-2024s-worst-cyberattacks-and-how-to-stay-secure/</link><pubDate>Mon, 13 Jan 2025 23:47:29 +0000</pubDate><guid>https://bsg.tech/blog/lessons-from-2024s-worst-cyberattacks-and-how-to-stay-secure/</guid><description>&lt;p&gt;2024 was a challenging year for &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;cybersecurity&lt;/a&gt;, with some of the most significant data breaches and cyberattacks making headlines. In this article, we analyze the key breaches outlined in &lt;em&gt;Wired’s&lt;/em&gt; article, &lt;a href="https://www.wired.com/story/worst-hacks-2024/"&gt;“The Worst Hacks of 2024,”&lt;/a&gt; along with high-value reference sources to dive deeper into the methods attackers used and the lessons we can learn. For each breach, we summarize the incident, highlight the vulnerabilities exploited, and recommend actionable countermeasures to strengthen defenses.&lt;/p&gt;</description></item><item><title>Salt Typhoon: A Wake-Up Call for Telecom User Privacy</title><link>https://bsg.tech/blog/salt-typhoon-a-wake-up-call-for-telecom-security-and-user-privacy/</link><pubDate>Mon, 30 Dec 2024 11:29:47 +0000</pubDate><guid>https://bsg.tech/blog/salt-typhoon-a-wake-up-call-for-telecom-security-and-user-privacy/</guid><description>&lt;p&gt;In late 2024, cybersecurity headlines were dominated by &lt;a href="https://www.politico.com/news/2024/12/27/chinese-hackers-telco-access-00196082"&gt;Salt Typhoon&lt;/a&gt;—a sophisticated cyber-espionage campaign attributed to Chinese state-sponsored actors. The attack targeted global telecommunications providers, exposing critical vulnerabilities in telecom infrastructure and endangering the privacy of millions. This campaign, while technically impressive, serves as a dire warning of how weaknesses in critical industries can have far-reaching implications for user privacy, corporate security, and even national resilience.&lt;/p&gt;</description></item><item><title>2024 EU Cybersecurity Insights</title><link>https://bsg.tech/blog/2024-eu-cybersecurity-insights-key-findings-trends-and-recommendations/</link><pubDate>Mon, 09 Dec 2024 11:55:52 +0000</pubDate><guid>https://bsg.tech/blog/2024-eu-cybersecurity-insights-key-findings-trends-and-recommendations/</guid><description>&lt;p&gt;The &lt;a href="https://www.enisa.europa.eu/publications/2024-report-on-the-state-of-the-cybersecurity-in-the-union"&gt;2024 EU Cybersecurity Report&lt;/a&gt; provides a detailed overview of the Union’s digital security challenges, key areas for improvement, and actionable strategies for stakeholders. As threats grow in complexity, this report highlights critical findings, emerging trends, and strategic recommendations to bolster the EU’s cybersecurity posture.&lt;/p&gt;</description></item><item><title>Zero-Day Vulnerabilities: A Growing Threat in Cyberattacks</title><link>https://bsg.tech/blog/zero-day-vulnerabilities-a-growing-threat-in-cyberattacks/</link><pubDate>Sat, 16 Nov 2024 14:07:05 +0000</pubDate><guid>https://bsg.tech/blog/zero-day-vulnerabilities-a-growing-threat-in-cyberattacks/</guid><description>&lt;h2 id="a-shift-in-cyberattack-tactics"&gt;A Shift in Cyberattack Tactics&lt;/h2&gt;
&lt;p&gt;The UK &lt;strong&gt;&lt;a href="https://www.ncsc.gov.uk/"&gt;National Cyber Security Centre (NCSC)&lt;/a&gt;&lt;/strong&gt;, together with its counterparts from the US, Australia, Canada, and New Zealand, recently released a joint advisory warning about a growing trend among cyber attackers: the exploitation of &lt;strong&gt;zero-day vulnerabilities&lt;/strong&gt;. These vulnerabilities, which are unknown to software vendors and developers at the time of the attack, present a unique and significant risk because they are exploited before a patch or fix is available. The advisory lists the top 15 vulnerabilities most frequently targeted in 2023, many of which were zero-days, highlighting a shift in the methods used by threat actors.&lt;/p&gt;</description></item><item><title>CVE-2022-0271: Leaflet Maps Marker SQL Injection Exploit</title><link>https://bsg.tech/blog/bsg-discovers-sql-injection-vulnerability-in-leaflet-maps-marker/</link><pubDate>Mon, 08 Aug 2022 13:42:00 +0000</pubDate><guid>https://bsg.tech/blog/bsg-discovers-sql-injection-vulnerability-in-leaflet-maps-marker/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In the ever-evolving landscape of cybersecurity, vulnerabilities can emerge in the most unexpected places. Recently, our team at BSG made a significant discovery: a SQL Injection vulnerability in the popular Leaflet Maps Marker plugin for WordPress (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1123"&gt;CVE-2022-1123&lt;/a&gt;). As with the previous discovery of &lt;a href="https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/"&gt;CVE-2022-25854&lt;/a&gt;, Ihor Bliumental was directly involved. This discovery underscores the importance of proactive security measures and the need to address vulnerabilities promptly to safeguard WordPress websites.&lt;/p&gt;</description></item><item><title>CVE-2022-25854: Tagify npm Stored XSS Vulnerability</title><link>https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/</link><pubDate>Tue, 10 May 2022 16:01:51 +0000</pubDate><guid>https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/</guid><description>&lt;h2 id="preface"&gt;Preface&lt;/h2&gt;
&lt;p&gt;Due to the russian war on Ukraine, we are much less active on this blog and social media. However, some events make us hit the dust off the keyboard and share some information. For instance, a vulnerability is worth a CVE. We found this one in February 2022, and a few others are under review. Meanwhile, all BSG team members are safe, and we stay operational.&lt;/p&gt;</description></item><item><title>Social Engineering: What It Is and How to Prevent It?</title><link>https://bsg.tech/blog/social-engineering-what-actually-is-it-and-how-to-prevent-an-attack/</link><pubDate>Fri, 24 Sep 2021 07:29:48 +0000</pubDate><guid>https://bsg.tech/blog/social-engineering-what-actually-is-it-and-how-to-prevent-an-attack/</guid><description>&lt;p&gt;Social engineering, according to its basic meaning, is the psychological manipulation of people with the primary goal of acquiring and disclosing &lt;a href="https://en.wikipedia.org/wiki/Confidentiality"&gt;confidential business and personal information&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It’s unnerving to think &lt;strong&gt;social engineering can happen anywhere&lt;/strong&gt; and to anyone, but you can take steps to protect yourself and your business’s confidential sensitive data.&lt;/p&gt;</description></item></channel></rss>