Article
Collections
Cyber Labs
Our Cyber Labs collection gives you access to the latest news and insights from Aon's cyber team. You can also reach out to our team at any time for assistance with your cyber needs.
-
01
Cracking Into Password Requirements
This blog post discusses new hashcat rule sets designed to crack passwords with minimum length and character class constraints, resulting in improved performance.
-
02
DUALITY: Advanced Red Team Persistence through Self-Reinfecting DLL Backdoors for Unyielding Control
This blog post introduces the concept of DUALITY, which is a methodology and pipeline for backdooring multiple DLLs on the fly so they are able to re-infect each other if infections are lost due to program updates.
-
03
Detecting “Effluence”, An Unauthenticated Confluence Web Shell
Discovering Effluence, a unique web shell accessible on every page of an infected Confluence
-
04
Financially Motivated Criminal Group Targets Telecom, Technology & Manufacturing
This client advisory provides an overview of techniques and tactics attributed to a financially motivated criminal group that is actively targeting organizations across various industries.
-
05
From Risk to Reward: Turning Data Breaches into Deal Value
Cyber security due diligence failure can vaporize value during strategic transactions such as M&A deals. Use of assessments helps decrease risk exposure and improve company valuation.
-
06
To Combat Cyber Risk, Businesses Invest in Resilience
Cyber security is a growing business concern, but many companies still need to improve their cyber resilience in key areas. Aon’s 2023 Cyber Resilience Report explores how global industries are protecting themselves against cyber threats.
-
07
For Cyber Readiness, the CISO and CRO Join Forces
As cyber attacks increase and become more costly, cyber security coordination across business units has become more important than ever. By bringing the chief information security officer (CISO) and chief risk officer (CRO) together, companies can take a proactive approach to minimizing cyber risks.
-
08
Mitigating Insider Threats: Managing Cyber Perils While Traveling Globally
Employees often face cyber attacks while they’re on travel for business, putting sensitive company data, trade secrets and intellectual property at risk.
-
09
Buyer-Friendly Cyber and E&O Market: How to Take Advantage
A buyer-friendly Cyber and E&O market is quickly emerging. Learn more about the changing global market and how to capitalize on it.
-
10
Managing Cyber Risk through Return on Security Investment
A ROSI framework allows businesses to link risk, security and insurance to help manage cyber exposure and increase cyber resilience.
-
11
Top 5 Cyber Threats To Mergers and Acquisitions
How can executives and deal teams execute deals with cyber due diligence and create a competitive advantage?
-
12
Cyber Attacks: How to Rapidly Detect, Respond and Contain Damage
How can firms stay on top of cyber threats in an increasingly digitalized world?