Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Behind the Scenes: JaskaGO's Coordinated Strike on macOS and Windows

In recent developments, a sophisticated malware stealer strain crafted in the Go programming language has been discovered by AT&T Alien Labs, posing a severe threat to both Windows and macOS operating systems. As of the time of publishing of this article, traditional antivirus solutions have low or even non-existent detection rates, making it a stealthy and formidable adversary.

How to Create an Effective Services Page on a Website

The "Services" page is the page where the user can get more specifically acquainted with your offer, find out how you differ from your competitors, and in some cases, the price. Usually they come to it from the main page, having already received a first impression of you, having learned your name, and, possibly, your USP. Your main task on the "Services" page is to tell about what you do so that the visitor immediately reaches for the "Order" button or to their phone.

[Guide] An In-Depth Look at Common Controls and the RMF

When it comes to implementing security controls throughout an organization, there are a lot of cases where the work may be doubled, tripled, quadrupled or more by having to “reinvent the wheel” multiple times. It’s a common problem, but fortunately, it also has a common solution: common controls. What does all of this mean? Let’s dig in.

Apache Struts 2 Remote Code Execution (CVE-2023-50164) - Cato's Analysis and Mitigation

By Vadim Freger, Dolev Moshe Attiya On December 7th, 2023, the Apache Struts project disclosed a critical vulnerability (CVSS score 9.8) in its Struts 2 open-source web framework. The vulnerability resides in the flawed file upload logic and allows attackers to manipulate upload parameters, resulting in arbitrary file upload and code execution under certain conditions. There is no known workaround, and the only solution is to upgrade to the latest versions, the affected versions being.

How automation can ensure compliance and safety for businesses?

In today’s complicated, highly interdependent business environment, assuring business security is not just a regulatory requirement. It’s also a vital component of a successful business strategy. Automation becomes crucial in such a world, offering innovative solutions that streamline operations, mitigate risks, enhance overall safety, and provide peace of mind.

CISO Roles and Responsibilities (and Job Description Template)

It’s well known by now that cyber attacks and successful breaches have exploded in recent years. Accenture’s latest report on the state of cybersecurity notes that companies experience an average of 270 attacks per year. And Gartner warns that nearly half of organizations worldwide will experience an attack on their digital supply chains.

Igniting Innovation at SPARK '23: Day One Highlights

Fireblocks’ second annual user conference, SPARK ‘23, saw nearly 600 attendees representing over 300 companies in the digital asset and crypto space. Kicking off the conference was the welcome reception, which featured a spectacular drone show. The display set the tone for what SPARK is about – innovation and community. The conference empowers customers to maximize the full potential of the Fireblocks platform while forging new alliances with fellow leaders.

Outdated SMB1 Protocols are Dropped in Microsoft's Latest Windows 11

Microsoft implements enhanced connection and encryption and removes outdated SMB1 firewall rules to improve Windows 11 security. Microsoft’s most recent Windows 11 Insider Preview Build includes a significant change to handling firewall rules, especially the outdated SMB1 protocol. By mimicking the actions of the Windows Server “File Server” role, the new method seeks to give customers a better level of network security.

Securing Your Supply Chain: Risk Management vs Security Management

Supply chain management has become a top priority for businesses due to the increasing use of digital technologies and geopolitical uncertainties, making global supply chains more vulnerable than ever to disruptions. This reality highlights two critical aspects of supply chain management: Supply Chain Risk Management (SCRM) and Supply Chain Security Management (SCSM).

Guarding Governance: Cybersecurity in the Public Sector

Public sector organizations are responsible for maintaining trust and storing sensitive data. Unfortunately, they have become a popular target for cyber threats, ranging from data breaches to advanced nation-state attacks. To address this evolving cyber risk landscape, it is essential to take a proactive approach to cybersecurity. This will help safeguard critical infrastructure and protect the privacy of citizen data.