Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Volatile Data Acquisition on Linux Systems Using fmem

The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Memory forensics is a critical aspect of digital forensics, allowing investigators to analyze the volatile memory of a system to uncover evidence of malicious activity, detect hidden malware, and reconstruct system events.

Advanced Threat Protection for Apps Built Using AI

AI has undoubtedly revolutionized various industries, enhancing both efficiency and innovation through low-code and no-code platforms. Yet, this ease of development brings with it an increased burden of security. As business users and developers rapidly build applications, automations, and bots using AI, the complexity and volume of these creations amplify potential security vulnerabilities.

SQL Server Orphaned Users - Detection and Remediation Steps

Orphaned users SQL Server arise when a database user is associated with a login in the master database that no longer exists and should be removed. This situation can happen when the login is removed or when the database is transferred to a different server lacking the corresponding login. The SQL Server logins existing on a server instance can be seen through the sys.server_principals catalog view and the sys.sql_logins compatibility view.

Mastering Identity and Access Management Policies: A Comprehensive Guide

How can your business develop and maintain identity and access management policies that safeguard your digital assets while providing appropriate access levels? In this guide, we explore the key elements of IAM policies, their critical role in organisational security, and offer actionable insights for crafting policies that align with both business needs and regulatory demands.

EU Is Tightening Cybersecurity for Energy Providers

The energy sector is having a tumultuous decade. During the COVID pandemic, the price of oil plummeted. In 2021, a ransomware attack forced one of the US’s most significant oil pipelines to cease operations for five days, causing a state of emergency in seventeen states. Putin’s war in Ukraine has disrupted natural gas supplies across Europe. And now, it seems, it is the electricity providers’ turn to suffer a blow.

How to Select the Right Data Discovery Tool for Your Requirements

Sensitive data, like customer information and internal processes, often lurks hidden in employee devices or in unmanaged spreadsheets. This “shadow data” poses a security risk because it’s difficult for IT teams to monitor and protect. Without visibility into this hidden data, organizations can’t effectively enforce security policies, putting them at risk of data breaches. Mishandling sensitive data can have severe consequences.

Combating the DDoS IoT Threat: Strategies to Protect Your Connected Devices

In the realm of IoT, DDoS attacks are not just a threat but a harsh reality. This article cuts through the complexity of DDoS IoT threats, offering a clear understanding of how IoT devices are hijacked for DDoS attacks and presenting actionable strategies to protect these devices. From recognising vulnerabilities to implementing robust defences, we provide the insights you need to secure your network against the dire consequences of DDoS attacks.

How a Digital Marketing Agency can Transform Your Online Presence

Today, having a strong online presence is essential. With billions of people using the internet daily, businesses of all sizes need to get on board with digital marketing to reach their target audiences, establish their brands, and drive growth. Understanding and implementing effective digital marketing strategies can be challenging, especially without specialized expertise. This is where a digital marketing agency can be an invaluable asset, providing the knowledge, resources, and strategic guidance to help you achieve your online goals.

Trojan Warning: Malware Identified in VAHAN PARIVAHAN.apk

The Foresiet Threat Intelligence Team has recently conducted an in-depth analysis of an Android malware Trojan masquerading as the "VAHAN PARIVAHAN.apk" application. This trojan poses a significant threat to users by leveraging a backdoor, utilizing the Telegram API bot, and exploiting the services of GoDaddy.com LLC and Mark Monitor Inc. In this blog, we delve into the specifics of this malware, including its technical details, behavior, and potential impact on users.