Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Insider Risk Management: Addressing the Human Side of Risk

Recognizing the indicators of insider risk before they turn into threats requires a paradigm shift in the way we operate. It necessitates moving from a reactive mode of operation to proactive. And it requires data that is continuously captured and analyzed to enable security teams to easily see patterns and anomalies and gauge the level of risk of specific behaviors.

Weekly Cyber Security News 22/08/2024

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! A badly coded WordPress plugin again. Luckily it has been caught: Sneaky! DNS is such a great lure for using as a control channel. I’m really surprised its not used more: Oh dear. At least they found it in the end…

Email DLP: How To Stop Insider Threats In Their Tracks

Data Loss Prevention (DLP) for email systems helps organizations prevent sensitive data within email from being lost, leaked, or accessed by unauthorized individuals, be it an insider risk or malicious behavior from outside. Solutions for email DLP monitor inbound and outbound messages, searching for loss risks like content or attachments that are sensitive, confidential, or protected by regulation. Email DLP systems can flag, block, or delete an email based on custom policy.

Major Difference Between MSI vs EXE Installers

An MSI (Microsoft Installer) installer is a file format and technology that Microsoft developed for installing, maintaining, and removing software on the Windows operating system. MSI installers are the usual tools for software deployment in companies and for software distribution to users. MSI installers’ main characteristics are the structure’s packaging, the possibility of installation customization, rollback, silent installation, patch management, and digital signing.

What is Remote Code Execution? Types, Impact, Technique and Prevention

Remote Code Execution (RCE) is an attack technique where an attacker can execute remote code on a target system or device while smiling from ear to ear without physical access. In this attack, a hacker exploits system weaknesses such as software, operating systems, or network protocols to gain unauthorized access and execute malware onto the target system.

The Rise of the Machines and the Growing AI Identity Attack Surface

In 1968, a killer supercomputer named HAL 9000 gripped imaginations in the sci-fi thriller “2001: A Space Odyssey.” The dark side of artificial intelligence (AI) was intriguing, entertaining and completely far-fetched. Audiences were hooked, and numerous blockbusters followed, from “The Terminator” in 1984 to “The Matrix” in 1999, each exploring AI’s extreme possibilities and potential consequences.

Sysdig's AI Workload Security: The risks of rapid AI adoption

The buzz around artificial intelligence (AI) is showing no sign of slowing down any time soon. The introduction of Large Language Models (LLMs) has brought about unprecedented advancements and utility across various industries. However, with this progress comes a set of well-known but often overlooked security risks for the organizations who are deploying these public, consumer-facing LLM applications.

How To Improve Email Security with Data Loss Prevention (DLP)

Email remains a critical communication channel for businesses of all sizes, but it also presents significant data security risks. Data loss prevention (DLP) for email is an essential component of any robust cybersecurity strategy that can help your organization safeguard sensitive information from accidental leaks, malicious insiders, and external threats.