Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

'Tis the Season for Artificial Intelligence-Generated Fraud Messages

The FBI issued an advisory on December 3rd warning the public of how threat actors use generative AI to more quickly and efficiently create messaging to defraud their victims, echoing earlier warnings issued by Trustwave SpiderLabs. The FBI noted that publicly available tools assist criminals with content creation and can correct human errors that might otherwise serve as warning signs of fraud.

ByteCodeLLM - Privacy in the LLM Era: Byte Code to Source Code

ByteCodeLLM is a new open-source tool that harnesses the power of Local Large Language Models (LLMs) to decompile Python executables. Furthermore, and importantly, it prioritizes data privacy by using a local LLM that you can run under any environment, like old laptops and VMs. ByteCodeLLM is the first decompile program that manages to decompile the latest versions of Python 3.13 locally.

Arctic Wolf Labs Observes Threat Campaign Targeting Cleo MFT Products - Remediation Guidance

Update: Dec 11, 2024. Find the latest information in our follow-up security bulletin. On December 7, 2024, Arctic Wolf began observing a novel campaign exploiting Cleo Managed File Transfer (MFT) products across several customer environments. Initial indications of malicious activity in this campaign were identified as early as October 19, with a sharp increase in early December.

Cloud Logs: The Unsung Heroes of Detection and Response

Cyberattackers are exploring stealthier and more sophisticated methods to infiltrate cloud environments. From exploiting misconfigurations to leveraging stolen credentials, adversaries are skilled at evading detection. Cloud logs are invaluable in helping organizations identify potential threats before they can cause damage.

Part of the AWS EDP program? Burn down your commit with 11:11 Systems.

If you’re part of Amazon Web Services Enterprise Discount Program (AWS EDP), we can help you make the most of your EDP commitment. That’s because you can burn down some of the amount you’ve committed to spend by leveraging 11:11 solutions and services.

Elevating Cyber Resilience for Your Business

Protecting your business from cyber threats today means building a stronger tomorrow. As we see firsthand, the digital backdrop has grown increasingly complex, and with it, the risks businesses face daily. AI-powered threats are more sophisticated, making it critical for organizations to evolve their cybersecurity strategies.

How YARA rules can complement NDR for malware detection

The Verizon 2024 Data Breach Investigations Report found that system intrusion is the leading attack pattern for the third consecutive year, accounting for 36% of breaches. System intrusion largely consists of a threat actor using hacking techniques and malware to infiltrate the victim organization. Following a successful intrusion, the attacker continues on a multi-stage process: The longer an attacker remains undetected, the greater their opportunity to find a target and extract data.

MFA in M365 - Some Common MSP Misconceptions

I speak with many MSPs online, in demos, at events, over email, and chat. They must cover multiple areas of knowledge. Maintaining specialist knowledge in each area is a constant battle. But when MSPs search for answers, they're often met with a sea of information from others trying to make sense of things too. True expertise can get lost amongst the speculations and partial confusions. Microsoft 365, being ubiquitous, adds to their challenges.

How to mitigate SSRF vulnerabilities in Go

Securing HTTP requests is crucial when developing Go applications to prevent vulnerabilities like Server-Side Request Forgery (SSRF). SSRF occurs when an attacker manipulates a server to make unintended requests, potentially accessing internal services or sensitive data. We will explore how to secure HTTP requests by employing URL parsing and validation techniques, and provide example code to fortify the http.Get HTTP GET request handler.