Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Detect and Defend: 5 Tips for Guarding Against Insider Threats

Not every cybersecurity threat originates outside of the organization. External threats tend to receive more attention, but an IBM report shows that a breach caused by an insider threat can carry an even higher cost. In fact, malicious insider attacks cost an average of $4.99 million despite accounting for just 7% of breaches. That makes them the most expensive breach vector in the report.

Cato CTRL Threat Research: CVE-2023-49559 - gqlparser Directive Overload DoS Vulnerability

The Cato CTRL and Cato Application Security Research teams recently discovered CVE-2023-49559, a directive overload Denial of Service (DoS) vulnerability in the gqlparser library, which is a crucial component in the development and running of GraphQL applications. The vulnerability is of medium severity (CVSS score of 5.3). The gqlparser library is an integrated component of the gqlgen Golang GraphQL server, widely used in web applications to handle GraphQL queries.

North Korean Hackers Target Software Developers With Phony Coding Tests

Researchers at ReversingLabs warn that North Korea’s Lazarus Group is targeting software developers with phony job interviews. The threat actors are posing as employees of major financial services firms and send coding assessment tests as part of the interview process. Our team recently recorded a webinar that covers this exact topic, as our cybersecurity experts discuss how we spotted the red flags and stopped it before any damage was done.

Nightfall AI Honored as Winner of the 2024 SC Awards

San Francisco, California, September 18, 2024 — Nightfall AI has been named a winner in the prestigious 2024 SC Awards. Nightfall has been recognized in the Best Data Security Solution and Best Insider Threat Solution categories, underscoring their team’s commitment to excellence and leadership in the cybersecurity industry. View the full list of 2024 SC Awards winners here.

CVE-2024-38812: Critical RCE Vulnerability Fixed in VMware vCenter Server and Cloud Foundation

On September 17, 2024, Broadcom released fixes for a critical vulnerability impacting VMware vCenter Server and Cloud foundation, tracked as CVE-2024-38812. This vulnerability is a heap-overflow flaw in the implementation of the DCERPC protocol that a remote attacker can use to send specially crafted network packets to vCenter Server, potentially leading to Remote Code Execution (RCE).

What does it take to become a Top Builder in Tines?

We’ve just introduced the Tines Top Builder score, a measure of user activity that shows just how much hands-on experience you’ve had in Tines in a given year. Why track our Top Builders? We realized we were seeing a high level of achievement from our users – to the extent that it warranted some recognition. We set out to identify exactly who our Top Builders were, with the intent to celebrate their achievement at the end of each year.

Active Roles release 8.2: Enhancements for hybrid cloud and Entra ID

You may already be using Active Roles to manage privileged access, identity and Active Directory (AD) from a single pane of glass. But now, you can get more. Active Roles release 8.2 is poised to offer multiple new features that support customers who are migrating to the cloud and applying web-based resources during the continuing market evolution. It also introduces enhancements to management within Entra ID.

Immutable Ledgers: Recording Time-Sensitive Decisions and Knowledge

In a time when everything said, whether factual, fake, or AI-created, may be recorded and posted on the internet, it’s more important than ever to ensure that what was recorded accurately represents a point in time. When someone claims you said, “I was Smoking on a flight, watching Star Wars, the best special effects movie of all time,” was that a false claim? Did they include the date and the context?

Information vs. Operational Technology: IT vs. OT Explained

Since the rise of the Internet, organizations and individuals have increasingly sought ways to keep their information secure and private. IT has witnessed a changing cyber threat landscape, and businesses have relied more and more on the Internet and data to function. However, the attack landscape widened in the 2010s. With widespread computer worms like Stuxnet in 2010, cybercriminals have gained critical access to organizations through operational technology.

Stronger Security with Corelight and Mandiant Managed Defense

At Corelight, we’re thrilled when a respected cybersecurity leader like Mandiant introduces a new offering based on our solution. This week, Mandiant Managed Defense unveiled support for Corelight Open NDR, a move that strengthens our existing relationship and integration across the Google Cloud Security portfolio.