Recently, an Apache Tomcat web server vulnerability, tracked as CVE-2024-50378, has been published, exposing the platform to remote code execution through a race condition failure.
In an age where cyber threats are increasingly sophisticated and prevalent, organizations must prioritize integrating security into the very core of their technology. Security can no longer be an afterthought or a box to check; it needs to be part of the design and development process from the start.
A primary goal for security teams is identifying specific threats to their environment, but they often face the daunting task of reviewing vast amounts of log data and alerts. Even with well-crafted detection rules, sifting through irrelevant data to pinpoint essential details for an investigation can be a significant challenge. This not only prolongs investigation times but also increases the risk of overlooking critical information.
Since December 16, 2024, Arctic Wolf has observed increased activity in a social engineering campaign associated with Black Basta ransomware. In this campaign, threat actors were observed using Microsoft Quick Assist and Teams to impersonate IT personnel and engage in malicious activities upon contacting victims. This is a continuation of the Black Basta campaign we reported on in a security bulletin sent in June 2024.
NAKIVO Backup & Replication provides fast incremental backups for vCenter-managed and standalone ESXi workloads, ensuring your VMs and data are recoverable in case of a data loss incident. Watch this video for a step-by-step guide on how to back up your VMware VMs with NAKIVO.
Cybercrime targeting law firms has surged by 77% in the past year, raising significant concerns for the legal sector. The frequency, nature, and motivations of these attacks are evolving, putting law firms in a vulnerable position. Due to the sensitive nature of their data and high stakes, law firms are frequent targets for financially motivated cybercriminals, hacktivists, and even state-sponsored groups.
Thanks to the rise of cloud storage, businesses now have a secure platform to store confidential files, client data, and customers' personal information. However, due to the sensitive data businesses store, the General Data Protection Regulation (GDPR) was formed on May 25, 2018. The GDPR protects individuals' privacy and personal data in the EU.
As organizations embrace DevOps practices and CI/CD pipelines to accelerate software delivery, their greater dependency on third-party components can introduce security risks. Because malware can infiltrate an environment during development, it’s important to check for it ahead of deployment.
As most security teams know, vulnerabilities often steal the limelight with sensational headlines and zero-day exploits. However, lurking beneath the surface are misconfigurations — overlooked risks that can leave even well-protected systems exposed. Addressing these configuration errors is essential. Security configuration assessment (SCA), also known as configuration management, is the process of discovering unsafe configuration settings.
Fact: An organization of any size has employees that receive email. Fact: Threat actors, with the help of apps like ChatGPT, are becoming more efficient at creating compelling phishing emails. Fact: The law of averages mandates an attack will succeed when a staffer is fooled and opens a malicious email or clicks on the wrong link. Fact: A robust email security strategy, which includes a Secure Email Gateway, is a must to protect against email-borne attacks.