Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Set Up Fluent Bit and the Nightfall Filter Plugin

Sensitive data often makes its way into logs. Though most of the time unintentional, these incidents have the potential to do a lot of damage, as they usually involve exposure of API keys, passwords, and customer data that can give attackers access to critical business data or put companies at compliance risk. This is why it’s important for organizations to be proactive about securing their logs.

Weekly Cyber Security News 04/03/2022

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Well not a great time for NVIDIA, after being deprived of buying ARM, they have now been breached in what looks like hackers wanting GPU restraints removed for more efficient cryptocurrency mining.

10 Reasons Why Links are Better than Attachments

Even with the rise of messaging apps and other collaboration software, email remains the tool for business communications, both inside and outside the organization. And despite its enduring ubiquity, email still has its drawbacks, especially when it comes to sharing documents, PDFs, photos, and other types of content. The average person spends about 28% of their workday dealing with emails, sending and receiving more than 600 each week.

How to Protect Your Business from DDoS Attacks

If a couple of years ago Distributed Denial of Service attacks (DDoS) were just a nuisance for businesses, today they constitute serious, costly cybercrime. Equally, if not more alarming, is the use of cybercriminals as surrogates in state-to-state political conflicts. The tools for launching these attacks are easily available online. They are so simple and cheap to use that even amateur citizen fraudsters and kids can commit a financial crime.

Be On Alert: Steps to Take Ahead of Possible Cyber Attacks

Netskope is keeping a close watch on the rapidly changing situation in Ukraine. Along with the attention we are giving to the safety and well-being of Netskope employees in the region, we are in a state of high alert with respect to cyber threats and risks to our customers. Netskope Threat Labs is continuously monitoring cybersecurity threats related to the conflict in Ukraine.

How to Protect From Potential Cyber Threats Stemming From Russian/Ukrainian Crisis

The following organizations should raise their INFOCON levels and be prepared for cyber-attacks because of this conflict: Our threat intelligence teams continue to enhance Obrela’s technology with new threat intel information as soon as it becomes available. We are conducting threat hunting activities to proactively detect and respond to emerging threats.

Dark Web Insights: Evolving Cyber Tactics Aim to Impact the Russia-Ukraine Conflict

The Russia-Ukraine conflict currently is ongoing and continues to escalate. Trustwave is on heightened alert, and we are actively monitoring malicious cyber activity associated with and adjacent to the conflict between Russia and Ukraine.

Staying safe online when you live off-grid

Over 250,000 people in the US live off the grid, meaning they do not rely on public utilities such as electricity and water. Their aim is generally to live more independently and self-sufficiently, rely on solar or other eco-friendly technologies, and build a stronger connection with nature. However, most people who choose this lifestyle are very much reliant on the Internet.

KapeTriage MindMap for DFIR Practitioners

The Kroll Artifact Parser and Extractor (KAPE) utilizes Targets and Modules to collect and parse digital evidence. Its Compound Targets and Compound Modules call upon other Targets and Modules in order to collect and parse the most important data as efficiently as possible. One of KAPE’s most widely used Compound Targets for incident response (IR) is KapeTriage.