Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CVE-2023-49103, CVE-2023-49104, and CVE-2023-49105: Multiple Critical Vulnerabilities in ownCloud

On November 21, 2023, ownCloud published advisories on three security vulnerabilities. The most severe of these vulnerabilities is an information disclosure vulnerability tracked as CVE-2023-49103 (CVSS: 10). The vulnerability is within the “graphapi” extension and is due to a library it relies on. The library provides a URL that when accessed discloses configuration details regarding the PHP environment including environment variables.

Scale Your Vendor Risk Management Program with Automation

As your business grows and you work with more third-party vendors, you need to ensure security and stability across your entire vendor supply chain. With hundreds, if not thousands, of external vendors, it can be daunting and time-consuming for teams to compile all the necessary data about each vendor, evaluate the vendor's impact, and take action to ensure compliance with organizational needs.

How to Meet Cyber Insurance Requirements When All Identities Are at Risk

The growing frequency and sophistication of cyberattacks, especially on the ransomware front, have compelled even more companies to seek cyber insurance coverage. But as the need for coverage grows, so do the complexities. Even though we’re seeing a trend in which premiums have flattened, with expectations that this will continue as a market correction occurs, significant challenges remain for companies seeking coverage.

What To Do if Your Credit Card Information Is on the Dark Web

If your credit card information is on the dark web you need to immediately contact your credit card issuer, monitor your online accounts for any suspicious activity or transactions, check your credit report and place a fraud alert on your credit report as an extra precaution. Continue reading to learn how your credit card information could have gotten on the dark web and how to keep your credit card information safe in the future.

State of Log4j Vulnerabilities: How Much Did Log4Shell Change?

December 9 marks two years since the world went on high alert because of what was deemed one of the most critical zero-day vulnerabilities ever: Log4Shell. The vulnerability that carried the highest possible severity rating (10.0) was in Apache Log4j, an ubiquitous Java logging framework that Veracode estimated at the time was used in 88 percent of organizations.

Health Organization Records Stolen via Welltok's MOVEit - 930k+ Including Minors

The number of victims caused by the global MOVEit data breach continues to climb; Welltok has announced more exposures, this time from three more health organizations. Welltok is an online provider of lifestyle health services and allows health professionals to communicate quickly with their patients. This most recent announcement involves Elixir RX Solutions from Ohio, OrthoNebraska from Nebraska, and OSF HealthCare System from Illinois.

Phishing-Resistant MFA Will Not Stop Phishing Attacks

You would be hard-pressed to find an author and organization (KnowBe4) that has pushed the use of phishing-resistant multi-factor authentication (MFA) harder. When the world was touting “MFA,” we were shouting “PHISHING-RESISTANT MFA” even louder, including here: Today, many of the world’s leading cybersecurity voices, including CISA, Microsoft and Google are pushing phishing-resistant MFA. Here is CISA’s take on it.

The Future of Cyber Threat Intelligence: 10 Trends and Predictions

In the ever-evolving world of cybersecurity, staying ahead of threats is not just a matter of strategy but of survival. Cyber threat intelligence (CTI) has become an invaluable tool in this ongoing battle, helping organizations predict, prepare for, and respond to cyber threats more effectively. As we look to the future, several emerging trends and technological advancements are set to redefine the landscape of CTI.

The Evolution of Artificial Intelligence in Cyber Threat Hunting

The role of artificial intelligence (AI) has become increasingly prominent, particularly in the realm of cyber threat hunting. Cyber threats continue to evolve in complexity and sophistication, posing significant challenges to traditional cybersecurity measures. As a result, organizations are turning to AI-driven solutions to enhance their threat detection and response capabilities.

Safeguarding Justice

In an era dominated by digital advancements, the legal landscape is not exempt from the pervasive threat of cyberattacks. Law firms, entrusted with sensitive and confidential client information, must prioritize cybersecurity to safeguard both their clients and their own reputation. The consequences of a security breach can be severe, ranging from financial losses to irreparable damage to the firm’s integrity.