Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Can MFA Be Bypassed by Cybercriminals?

Enabling Multi-Factor Authentication (MFA) is a cybersecurity best practice that helps protect online accounts from unauthorized access; however, not all forms of MFA are created equally in terms of security. There are ways that cybercriminals can bypass MFA. Some MFA methods are more vulnerable to cyber attacks and are often exploited by cybercriminals. There are methods of MFA that do a better job of protecting your online accounts; you just have to choose the correct option.

Trustwave Named a Representative Vendor in 2024 Gartner Market Guide for Co-Managed Security Monitoring Services

Trustwave has been named a Representative Vendor in Gartner just released the 2024 Market Guide for Co-Managed Security Monitoring Services. Gartner estimates that there are more than 500 vendors who offer co-managed security monitoring services. Trustwave was listed as a Representative Vendor that does not imply an exhaustive list.

Access This Computer From the Network - Best Practices for DC and Member Servers

This policy enables users on the network to establish connections with the computer, and it’s necessary for several network protocols such as Server Message Block (SMB), NetBIOS, Common Internet File System (CIFS), and Component Object Model Plus (COM+).

Are your APIs secure? Try our new free tool: API Specification Evaluator

Test API specification With the growing footprint of APIs, there is a strong need for secure-by-design APIs. A design blueprint of an API would be a helpful start in determining the security standard of an API. Fortunately, APIs have that blueprint known as an OpenAPI Specification. API Specifications play a crucial role in ensuring the security and functionality of APIs.

Breaking: What is Going on with the NVD? Does it Affect Me?

Headed by NIST, an American government institution, the National Vulnerability Database (NVD) contains vulnerability data that’s been key to protecting organizations both within and without the US borders for more than 20 years. Many security policies from both commercial and government organizations require that vendors take care of vulnerabilities of a particular severity as given by the NVD within a certain number of days.

OpenShift Security: How to Protect Your Kubernetes Environment

Kubernetes and its enterprise-level cousin, Red Hat OpenShift, have secured their spot as the platforms of choice when it comes to managing containerized applications at a large scale. However, these complex environments require maintaining top-level security. According to a recent survey, 80% of companies faced at least one cloud security incident in the past year. As OpenShift clusters grow more complex, the potential for vulnerabilities also increases, increasing the risk of exploitation.

ASPM Best Practices for Secure Success

The days where applications were monoliths built of proprietary code, and releases were set quarterly are no more. Instead, they have been replaced by fast paced development sprints, with software created using plenty of code from open-source repositories. The growing complexities of software development and the associated risks have far exceeded the abilities of traditional application security.

The Value of Continuous Threat Exposure Management in Securing the Evolving Attack Surface

In cybersecurity, current approaches don’t stay current for long. Organizations that fail to adapt accordingly often discover this fact at the cost of their secure network. This is particularly true in the face of complex and increasingly unpatchable attack surfaces and a corresponding reduction in the impact of automated remediation practices. Traditional security approaches are unable to fully address these challenges.

LESLIELOADER - Undocumented Loader Observed

Kroll observed the use of SPARKRAT in conjunction with a previously undocumented loader written in Golang. The loader assists in the initial infection and deployment of the malicious payload, enabling SPARKRAT to execute on a system. This process allows the payload to reach the target system undetected and unquarantined. The loader achieves its goal by decoding and decrypting a secondary payload binary, then injecting it into a notepad.exe instance.