Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

Windows Spotlight - Configurations for Your Lock Screen

Windows Spotlight automatically displays a variety of high-resolution lock screen images. These come from various sources, including Bing searches, professional photographers, and Microsoft’s own collection. It's available on Windows Enterprise and Education editions only. The images encompass a variety of subjects from nature scenes, cityscapes, and architectural marvels to keep a fresh login screen.

Understanding an 0ktapus Phishing Campaign

The recent surge in phishing attacks capable of bypassing multi-factor authentication (MFA) has raised significant concerns in the cybersecurity landscape. These attacks highlight the fact that even systems protected by MFA have vulnerabilities, making it imperative for organizations to stay vigilant and not rely on a single control as a silver bullet. One such campaign, known as 0ktapus, provides a crucial case study in understanding the methods and impacts of these phishing attacks.

Black Hat NOC: Zero Trust...but Verify | Corelight

The Black Hat network is unlike an enterprise network. The network operations center (NOC), which Corelight helps to operate, sees traffic that would never be permissible on most enterprise networks. Still, in many ways the Black Hat network is a microcosm of many real-world environments, with similar challenges that require similar solutions.

Lessons From the Front Line - Examining Real-Life Cyber Breaches

Cybersecurity professionals are bracing themselves as the relentless cycle of new phishing scams, malware attacks, and AI-enabled threats make it hard to stay a step ahead. Against this background, the Department of Home Affairs is proposing to establish a Cyber Incident Review Board to protect and investigate Australian organizations that have been breached. But is this enough?

How to evaluate AI features in workflow automation platforms

If you’ve been paying attention to the latest AI product releases or evaluating AI tools for your teams, you’ll probably have noticed how difficult it is to distinguish between hype and reality. Vendors are under an enormous amount of pressure to deliver AI features, and, as a result, many of these new tools feel rushed and fragile, and simply aren’t capable of solving important, real-world problems.

Why Is Manual Testing a Thing of the Past?

Before end-to-end (E2E) testing frameworks, the software development industry struggled with fragmented and inefficient testing methods. Testing was manual, labor-intensive, and prone to human error, which limited testing coverage and left many critical issues undetected until later stages of development. This manual approach relied heavily on developers and testers executing test cases by hand, leading to substantial inefficiencies and incomplete test coverage.

Security Misconfigurations - Detection and Automatic Remediation

Security misconfigurations can open the door to potential cyberattacks, leading to data breaches, system compromises, and other severe consequences for organizations. In modern IT environments, including cloud infrastructure and other digital platforms, these misconfiguration vulnerabilities are becoming increasingly common and complex. Preventing and addressing security misconfigurations requires a collaborative effort across DevOps, DevSecOps, and security teams.

Guide to SWIFT CSCF (Customer Security Controls Framework)

The SWIFT Customer Security Controls Framework (CSCF) is a key global cybersecurity framework that provides recommended and mandatory security controls for banking institutions that use the SWIFT banking system. The framework is designed to help financial institutions improve their cyber resilience and ensure that participants within the SWIFT network adhere to a stringent set of security compliance standards. Find out how UpGuard helps the financial services industry meet compliance standards >

The Current State of Browser Cookies

When you hear “cookies,” you may initially think of the delicious chocolate chip ones. However, web cookies function quite differently than their crumbly-baked counterparts. Website cookies are small data chunks, usually saved in a database, that websites transfer onto your computer or mobile device to save data and information about you. They enable sites to identify users and remember helpful information to enhance their experience.

8 Best Data Leak Prevention (DLP) Policies for Protecting Your Sensitive Data

Whether organizations are looking to prevent data exposure, meet leading compliance standards, or simply earn customer trust, Data Leak Prevention (DLP) policies are effective tools for pinpointing and protecting sensitive data across the cloud and beyond. DLP policies are especially useful in the following top use cases.