Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Why You Should Build an Agile, Integrated Construction Tech Stack

When it comes to construction technology, one size doesn’t necessarily fit all. Businesses often have different needs that require different tools to automate established processes, or standard operating procedures (SOPs). This creates a problem, however, because decision makers have to sift through the available technologies—and the depth and breadth of what processes they can cover—to find the right solution.

The Secure Data Layer: A Formidable Opponent Against Ransomware

When organizations are attacked by ransomware, only a little more than half are able to recover their data using a backup. This begs the question, “What about the rest? Why might they be unable to recover?” One reason may be that their backup data has been compromised. Backups are a hot target for hackers. If they can get to an organization’s backup data, they have far more leverage.

Detecting Remcos Tool Used by FIN7 with Splunk

We decided to try to run a well-known Remote Access Trojan (RAT) called Remcos used by FIN7. This tool has been around for some time and has a reputation for being stealthy and effective in controlling compromised hosts. Sold as a remote computer monitoring tool, this tool has plenty of features that can allow an operator behind the control to do multiple operations against a compromised system.

What Is a Cybersecurity Incident Response Plan?

Global cyberattacks increased by 29 percent in the first half of 2021 compared to 2020, and we can assume that cybercriminals and hackers won’t stop their malware and ransomware attacks any time soon. A strong cybersecurity strategy is vital to reduce losses from those attacks, and a robust incident response plan should be a part of that strategy.

Top Vendor Tiering Strategies to Mitigate Cybersecurity Risks

All organizations rely on vendors to function in today’s dynamic landscape while achieving peak operational efficiency, cost-effectiveness, and economies of scale. A growing third-party network can yield significant benefits for organizations — but it also results in greater risk.

SOC 2 vs. SOC 3 Compliance: What's the Difference?

According to a Pew survey in 2019, 70 percent of American adults believed at the time that their data was less secure than it had been five years prior. Now consider that a pandemic followed, along with major data breaches at the likes of Microsoft and others. One can safely assume Americans are even less confident about the security of their data today.

TensorFlow Python Code Injection: More eval() Woes

JFrog security research team (formerly Vdoo) has recently disclosed a code injection issue in one of the utilities shipped with Tensorflow, a popular Machine Learning platform that’s widely used in the industry. The issue has been assigned to CVE-2021-41228. This disclosure is hot on the heels of our previous, similar disclosure in Yamale which you can read about in our previous blog post.

Glance at 2020-21 eKYC mandates: Milestones India achieved on its digital journey

As India embraces the digital transformation and aligns with post pandemic lifestyle, working from home, shopping online, and managing money digitally has conveniently become a routine for us. This quick shift in the industry wouldn’t have been possible without quick regulatory advancements by government. Giving convenience a priority, critical functions like opening a bank account, lending a loan, large transactions, are now possible on fingertips.

Enhancing AT&T SASE with Palo Alto Networks 'as a Service'

A few months ago, I wrote a blog on “SASE as a Service” that described how managed services providers (MSPs) can be a catalyzing force for transforming to SASE and bridging the gap between networking and security teams. Since then, AT&T has released a series of managed SASE offers that bring together intelligent networking and cloud-based security in support of our customers.