Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A New World in Generative AI with Purple Llama - This Week in AI

Meta has announced the launch of Purple Llama, an umbrella project promoting open trust and safety in generative AI. The project features tools and evaluations designed to enable developers to deploy generative AI models and experiences responsibly in line with best practices outlined in Meta’s Responsible Use Guide.

Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928

In early 2021, a new vulnerability, identified as CVE-2021-27928, was discovered and published. It affects multiple versions of the open-source relational database management systems (RDMBS) MariaDB and Percona Server, and the wsrep (write set replication) plugin for MySQL. Fortunately, security professionals swiftly released a patch to ensure that affected systems could be updated to mitigate risks.

Insights From The SOC

A review of AI-generated malware, and how a SOC might deal with the ever-increasing threat… Theofanis Dimakis, SOC Officer, and Nikolaos Tsompanidis, Threat Detection & Response Expert at Obrela, speaking during the recent CRESTCon Europe event, shared insights from their perspective into detecting malware, including the rising tide of AI variants.

Password Management for Educators

Educators create many passwords for accounts in both their personal and professional lives. Password management is crucial for educators, not only to keep track of their professional passwords but also to separate those from their personal passwords. Teachers need a reliable place to store passwords for many online accounts, applications and programs, no matter which grades or subjects they teach. Read more to learn why password management is essential for teachers.

How to Find and Secure Your Network Key for Increased Online Privacy

When navigating between all your devices, one term you may have been asked to provide or seen on your tech travels—perhaps when setting up a Wi-Fi connection or troubleshooting— is the network key. A network key functions like a Wi-Fi password to secure your internet connection via a Wi-Fi router or anywhere else. As we know, anything that connects to the Internet requires a strong password to protect it from leaks, hacks, or breaches, and for that, you will need a strong network key.

When Patching Goes Wrong: Lessons Learned from The CrowdStrike Incident

Patches are a way of life for any network administrator and are the most efficient method in place to ensure systems are running the most up-to-date and secure versions of their various software applications. For the most part, updates take place behind the scenes, with the average person only noticing a patch being installed when they are asked to reboot their machine to install the new version.

ISO 27001 vs NIST: The Differences and How They Overlap

When you consider national and global cybersecurity, a handful of names stand out. Two of the largest are NIST and ISO/IEC. Both of these organizations have issued plenty of rulings and frameworks for securing digital systems, and in a sense, they can be viewed as competitors. So, what’s the difference, where is the overlap, and which option is right for your business?

X-FILES Infostealer: Unraveling a Potent Threat to Global Cybersecurity

In the dynamic world of cyber threats, the X-FILES stealer has emerged as a particularly dangerous and sophisticated piece of malware. First discovered in March 2021, this malware gained significant attention after a second variant surfaced later that year. Known for its efficiency in targeting vulnerable systems globally, X-FILES has become a top priority for cybersecurity professionals.