Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is Operational Security & Why is it Important?

Protecting your organization against security incidents is easy enough in theory, but many businesses struggle to find the right approach when it comes to their cybersecurity. As the digital transformation takes hold of the modern business environment, implementing safeguards to your organization’s critical information is only going to become more critical for survival-and if you aren’t doing so already, it’s time for your organization to take proactive protective measures.

7 Best Practices for Data Loss Prevention

Most organizations have at least one thing in common: every year, they’re generating and consuming more and more data. Dealing with all this data can be overwhelming, and especially so for those organizations that haven’t fully embraced the digital transformation and the cultural shifts that come along with it. As your data grows, so too does the risk that your data will be exposed to unauthorized parties in a security incident called a data breach or a data leak.

Follina - CVE-2022-30190

Monday, May 30th, 2022, Microsoft issued CVE-2022-30190 for a Remote Code Execution vulnerability with the Microsoft Support Diagnostic Tool (MSDT) in Windows: “A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application.

A vulnerable Wi-Fi network puts your organization's data at risk

A few weeks ago, a cybersecurity analyst unexpectedly discovered that he could dump files from the hotel network system where he was staying in Qatar to his own computer using the sync tool (used for file synchronization). Through an HSMX Gateway, he managed to access a welter of sensitive data held on an FTP server used for backup purposes. This included personal information on guests such as their room numbers, emails, and cell phone numbers.

Enriched attack surface view, DNS filtering, and more

Taking action on your attack surface requires a complete overview of what is exposed. This includes details such as open – and previously open! – ports, DNS records, and when the asset was last seen. These details help security teams respond more effectively to issues as they occur in production. It’s now possible for Surface Monitoring customers to drill down into an asset with the new Details page, which you can access by selecting an asset from the Attack Surface view.

Can global recruitment solve the cybersecurity hiring problem?

It’s well known that there’s a pervasive cybersecurity skills shortage. The problem has multiple ramifications. Current cybersecurity teams often deal with consistently heavy workloads and don’t have time to deal with all issues appropriately. The skills shortage also means people who need cybersecurity talent may find it takes much longer than expected to find qualified candidates. Most people agree there’s no single way to address the issue and no fast fix.

Optimism, Underestimation and Invincibility: Bridging the Gap Between Reality and Perception in Cyber Security

Earlier this month, the United Nations (U.N.) released its latest Global Assessment Report on Disaster Risk Reduction (GAR2022). For those of us who assess risk for a living, it is a sobering read.

The Difference Between Cybersecurity and Ethical Hacking

Ethical hacking is a field within cybersecurity where security experts assume the role of an unauthorized user and attempt to gain access to a private network or computer. These exercises aim to help targets identify any security vulnerabilities that could be exploited in a real cyberattack. Cybersecurity professionals utilize non-invasive methods, such as risk assessments, audits, and security questionnaires, to discover security risks.