Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How secured are touchless solutions?

Touchless solutions have risen to the forefront this year because of the latest pandemic that has reshaped the way we work and live. When social distance policies were placed in motion, borders closed, establishments paused operations, and businesses moved online operating amid lockdown. Touchless technologies had to be put in place almost everywhere to preserve human touch. It has ceased to be just an option since it is now a necessity in the new normal.

Detectify security updates for December 14

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers.

LogSentinel's 2020 Year in Review

The events of 2020 brought us unprecedented challenges that no one was prepared for, changing the way we live, work, and communicate, impacting the global economy, all geographic regions, and every single industry. In such a downturn cybercrime flourishes, especially when organizations move most of their operations and processes online.

Round up 2020: Regulatory changes in Digital Verification industry

We have witnessed major shifts in identity and verification industry as, post March 2020 a sudden explosion of people going digital was observed. It opened gates for vulnerability and opportunity for fraudsters. In April 2020, with a surge in work from home scenario- accelerated the process of administering remote systems and adequately protect them.

Buyer's Guide for GxP-Compliant Document Management

According to the FDA, 30 percent of clinical trials are flagged for data-integrity violations (i.e. missing source data and corrupted audit trails). The patchwork of evolving regulations, as well as relying on non-compliant consumer-grade technology to handle data collection and storage, are often hurdles in getting your raw data into a format that is submission-ready.

False Positive Breaches: Universal Audit Log Search Office 365

Modern cyber security threats have today mutated into a new class that is immune to detection and prevention solutions offered by the security industry. We are looking at this new generation of hackers that master zero-day exploits, credential thefts, fake identities, and developing stealthy malware. These threats have kept the security personnel on their toes, figuring out what the next attack would look like. One of these challenges includes identifying false positive and false negative alerts.

How to build a serial port fuzzer with Defensics SDK

Defensics SDK makes fuzz testing possible for custom protocols. Learn how to create a custom injector using the Defensics SDK API. Fuzz testing is never a bad idea. If you aren’t testing your implementation with malformed or unexpected inputs, someone else may be able to exploit a weakness simply from running the system. And fuzz testing (or fuzzing) is not only about finding potential security issues—it can also increase the overall robustness of the system.

Redland City Council Democratises Data with Rubrik

With a population of over 150,000, Redland City Council delivers municipal services to six residential islands spread along the southern coast of Moreton Bay in South-East Queensland between Brisbane and the Gold Coast. Glynn Henderson, CIO, saw data as the lifeblood of his organisation. “We see our data as an incredibly important asset.

Using Splunk to Detect Sunburst Backdoor

TL;DR: This blog contains some immediate guidance on using Splunk Core and Splunk Enterprise Security to protect (and detect activity on) your network from the Sunburst Backdoor malware delivered via SolarWinds Orion software. Splunk’s threat research team will release more guidance in the coming week. Also please note that you may see some malicious network activity but it may not mean your network is compromised. As always review carefully.