Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Security Update: Critical CUPS Vulnerability

A critical chained vulnerability (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) has been detected within the open-source printing system CUPS (present in most Linux distributions). Attackers can achieve remote code execution, potentially leading to complete control of the vulnerable system. Detectify customers can assess whether their systems are running affected versions of CUPS.

The Significance of the Number 42 in the New ISO AI Standard

The number 42 has gained legendary status in popular culture, largely due to Douglas Adams’ science fiction series, The Hitchhiker’s Guide to the Galaxy. In this series, a group of hyper-intelligent beings build a supercomputer named Deep Thought to calculate the “Answer to the Ultimate Question of Life, the Universe, and Everything”. After much contemplation, Deep Thought reveals the answer to be simply “42”.

Cybersecurity Best Practices for SOX Compliance

The Sarbanes-Oxley Act (SOX), enacted by the United States Congress in 2002, is a landmark piece of legislation that aims to improve transparency, accountability, and integrity in financial reporting and corporate governance. The act was a response to high-profile corporate scandals, such as those involving Enron, WorldCom, and Tyco International, which shook investor confidence and underscored the need for regulatory reforms to prevent corporate fraud and protect investor interests.

Sysdig Customer Care Chronicles - Security Is A Team Sport

For the Sysdig Customer Success team, our mission is simple: ensuring that our customers get the most value from our product. Usually that means helping them use the product, answering questions, and requesting feature enhancements. In our line of work, sometimes you have to throw out the usual playbook to make things happen. This particular story started when we noticed a change in a customer’s agent usage.

Deep Dive into Blockchain Security: Vulnerabilities and Protective Measures

Blockchain technology, renowned for its decentralized and immutable nature, promises enhanced security for various applications. However, like any technology, it is not without vulnerabilities. This in-depth examination explores the security aspects of blockchain, identifies common vulnerabilities, and outlines the measures needed to secure blockchain applications effectively.

Navigating Security Challenges in Hybrid Infrastructure

As organizations increasingly adopt a mix of cloud-based and on-premises systems, they face unique challenges in securing their hybrid infrastructures. Unlike traditional IT setups, where everything is managed within the confines of a single data center, hybrid infrastructures combine the agility of the cloud with the control of on-premises systems. While this blend offers flexibility and scalability, it also introduces security complexity and a broader attack surface.

Top 4 Most Common Cyberthreats to Organizations

In today's digital age, where cyberattacks are multiplying rapidly, understanding the threat landscape is essential for the survival of organizations. It is clear that cybercriminals are not resting on their laurels and are constantly developing new strategies. This forces businesses to stay ahead of the curve to protect their digital assets. Companies need to be aware of the most common cybersecurity threats and the appropriate protection measures to ensure the security of their sensitive information.