Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top 9 Software Supply Chain Security Tools

Imagine this: an attacker sneaks a tiny backdoor into software that hundreds of companies use. It sounds like a plot from a spy movie, but it’s a real threat that recently impacted major Linux distributions through a compromised utility tool, XZ Utils. So far, in 2024, over 35 billion known records have been breached. The Linux attack, potentially in action and undetected since 2021, is just one of the many that highlight the alarming proliferation of supply chain attacks.

The Evolution of Cyber Threats in the Age of AI: Challenges and Responses

Cybersecurity has become a battlefield where defenders and attackers engage in a constant struggle, mirroring the dynamics of traditional warfare. In this modern cyber conflict, the emergence of artificial intelligence (AI) has revolutionized the capabilities of traditionally asymmetric cyber attackers and threats, enabling them to pose challenges akin to those posed by near-peer adversaries.

Break free from IAM limitations: How disconnected identities throttle your business and what you can do about it

Imagine this: a sales representative at your company needs to update customer information in your CRM system. She enters her login credentials, but the system rejects them. After a frustrating series of password resets and calls to IT, she finally gains access. But her ordeal isn't over yet. She still needs to log into several other applications: the marketing automation platform, the customer support portal and the internal communication tool – each with its own unique username and password.

Understanding Broken Function Level Authorization

Application Programming Interfaces (APIs) allow your applications to talk to one another, like an application-to-application iMessage or Signal. If you’ve ever texted a message to the wrong group chat, you’ve created a situation that mimics what broken function level authentication does between users and applications.

Why Active Directory is your security perimeter

Active Directory (AD), a Microsoft Windows directory service, helps maintain a robust security perimeter within enterprise environments. It helps your business enforce security policies, assign permissions and mitigate security risks within the network. Let’s say your business’s IT infrastructure is a fortress, wherein AD acts as the gatekeeper controlling who enters and what they have access to.

Anonymous User Security for Everyday Users

Windows permits an anonymous user to carry out specific actions, such as listing the names of domain accounts and network shares. This functionality proves useful in scenarios when an administrator needs to provide access to users in a trusted domain lacking a reciprocal trust agreement. By default, the Everyone security identifier(SID) is excluded from the token generated for anonymous connections. Consequently, permissions assigned to the Everyone group don’t extend to anonymous users.

Complying With the New SEC Cybersecurity Regulations: A How-to Guide

‍Since the SEC's latest cybersecurity regulations went into effect, thousands of companies have already been compelled to submit their annual Form 10-K with the novel Item 1C. Similarly, dozens of organizations have filed updated Form 8-Ks to disclose cybersecurity incidents. Slowly but surely, these public reports are helping investors become more aware of the intrinsic relationship between cyber risk and market value.

Trojan Warning: Malware Identified in VAHAN PARIVAHAN.apk

The Foresiet Threat Intelligence Team has recently conducted an in-depth analysis of an Android malware Trojan masquerading as the "VAHAN PARIVAHAN.apk" application. This trojan poses a significant threat to users by leveraging a backdoor, utilizing the Telegram API bot, and exploiting the services of GoDaddy.com LLC and Mark Monitor Inc. In this blog, we delve into the specifics of this malware, including its technical details, behavior, and potential impact on users.

Cloud Sprawl: How to Tidy It Up

Cloud computing offers indisputable benefits, but with the caveat that it can quickly become a disorganized jumble unless adequately managed. It’s common for the average organization to use dozens of cloud instances, solutions, and resources scattered across multiple platforms. Such off-premises services quickly accumulate to accommodate the company’s ever-growing needs. This uncurbed growth, known as cloud sprawl, creates significant economic and security challenges.

Security Made Easy: Mobile Security That Won't Stretch Your IT Team

Mobile devices are now an integral part of the way we work, and because of that, mobile security has become a necessity when it comes to protecting an organization’s data. Yet with many IT and security teams already stretched to the limit, the task of incorporating mobile security into their existing operations may seem like an impossible task.