Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

Bring your own CA for client certificate validation with API Shield

APIs account for more than half of the total traffic of the Internet. They are the building blocks of many modern web applications. As API usage grows, so does the number of API attacks. And so now, more than ever, it’s important to keep these API endpoints secure. Cloudflare’s API Shield solution offers a comprehensive suite of products to safeguard your API endpoints and now we’re excited to give our customers one more tool to keep their endpoints safe.

Cyberattack Spotlight: The Zero-Day Exploit

A zero-day attack takes advantage of a weakness in a target’s network, software, or infrastructure—without the target even knowing. These type of cyber attacks can be devastating because the attack will continue unimpeded until it’s eventually spotted (that’s if it’s spotted at all). This article shines a spotlight on the danger. We define the features of zero-day incidents and consider some famous case studies.

Identify Gaps and Thwart Attacks with Devo Exchange and the MITRE ATT&CK Framework

The MITRE ATT&CKⓇ framework holds immense value in the realm of cybersecurity. With its comprehensive and structured approach, it serves as a powerful tool for understanding and countering complex, multi-vector cyber threats.

Guide to Cyberattack Risk: Mitigation and Response

Ransomware and cyberattacks are on the rise, and that’s a deeply concerning thought for technology leaders. Considering what a breach could cost, and how long it would take to rectify, it’s no wonder risk mitigation and response is at the forefront of every CTO’s mind. Ransomware is a type of malicious software that blocks access to a computer system or encrypts files until a ransom is paid. It’s often spread through phishing emails or infected websites.

Privileged Access Management (PAM) with Netwrix Solutions

Minimize your attack surface by eliminating the need for standing privilege altogether. Reduce the risk of business disruptions or compliance failures by managing and tracking all privileged activity in one place. Every day, organizations face the threat of cyberattacks that target privileged accounts. In fact, a staggering 74% of data breaches start with compromised privileged accounts and credentials. Is your organization prepared to defend against these attacks?

Email-Based Cyber Attacks in Europe Increase 7-Fold in Just One Year

An abnormally massive focus on business email compromise attacks in Europe has fueled an equally large growth in overall email attacks there, with the U.S. also seeing significant attack growth. We’ve seen a lot of recent reports looking back at 2022 to help provide insight into what to continue to expect this year. But new data from security analysts at Abnormal Security takes us well into June of this year, highlighting the problem of email-based attacks.

Honeypots and Their Role in Detecting Pass-the-Hash Attacks

Deception technology is a cybersecurity strategy that utilizes decoys to gather information about current threats and attack methodologies used by cybercriminals. The premise of this approach is to offer some sort of bait in your network, such as a fake database that looks like a legitimate one, that attackers will find too enticing to pass up.

Honeypot Recon: Enterprise Applications Honeypot - Unveiling Findings from Six Worldwide Locations

To obtain a better perspective of attacks worldwide, Trustwave has implemented a network of honeypots located in multiple countries across the globe. By distributing honeypots in such a manner, we can gather a reliable set of information on the methods and techniques used by attackers and their botnets. In our pursuit to explore the current threat landscape, we established a honeypot sensors network across six countries: Russia, Ukraine, Poland, UK, China, and the United States.