Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top 10 Docker Vulnerability Scanners for 2023

Docker has revolutionized how developers work by offering a powerful platform for creating, shipping, and running container applications. It helps developers conquer the complexity of application development and significantly increases software shipping frequency. Despite setbacks in recent years, Docker brings home $50 million in revenue every year, driven by the ongoing demand for new applications.

October Cybersecurity Awareness Month: How to empower smart security in your business

Every October the industry puts together information to share how people and businesses can be safer online. For this blog, we’re focusing on shadow IT – the hardware or software that employees use that isn’t managed by the company’s IT team – and how using a password manager can help.

Kovrr Highlighted in Gartner's CRQ Category in Gartner Hype Cycle

Kovrr has been recognized in the Gartner Hype Cycle for Cyber Risk Management this year. We believe this recognition serves as a testament to our commitment to empowering enterprise decision-makers to manage cyber exposure more effectively with in-depth risk analyses. ‍

Rubrik Invests in MSP offering to Accelerate MSPs with Cyber Resilience-as-a-service

Business leaders today must ask themselves a challenging question: “Who do I trust to face cybersecurity problems head on and consistently stay ahead of attacker trends?” Consider the following challenges of IT: As more and more businesses are turning to Managed Service Providers (MSPs), those MSPs must face the cybersecurity problems head on everyday and stay ahead of modern threats in order to defend themselves and their customers.

How to update cURL

On October 3, 2023, the curl team preannounced a pending fix for a high-severity vulnerability, which impacts both libcurl and curl. Snyk products help you identify and fix vulnerable packages and containers, but this vulnerability impacts curl, a command-line tool that many developers use on a daily basis. It's also distributed with many operating systems, so we thought it would be beneficial to provide some tips on how you can get it upgraded on your system.

Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487

Researchers and vendors have conducted an investigation into volumetric DDoS attacks in the wild between August – October 2023 that has resulted in the discovery of a novel “rapid reset” technique that leverages stream multiplexing, a feature of the widely-adopted HTTP/2 protocol. Disclosed today, the HTTP/2 rapid reset vulnerability is being tracked as CVE-2023-44487 and has been designated a High severity vulnerability with a CVSS score of 7.5 (out of 10).

Web Application Security: 5 Security Tips for Software Engineers

As a software engineer in a cloud-native world, you’re the first line of defense in web application security. Armed with a few best practices that have a huge impact, securing both the code you create and the code you compile can be simple. Here are five tips that make your role easier in protecting data with secure development.

How to Build Your Cybersecurity Leadership Skills as a SOC Analyst

Leadership skills are important for career growth in any industry, and cybersecurity is no exception. While you can certainly have a long, fulfilling career as a SOC analyst, you may be interested in moving up the ranks into a leadership position one day. Whether you aspire to be a SOC director or even a CISO, these tips will help you position yourself and develop the skills needed to move into a cybersecurity leadership role.

Enhance your search experience within Splunk by using the Corelight App

The Corelight App for Splunk provides the foundation for organizations to boost SOC effectiveness and productivity by using Corelight data in Splunk. In this blog, I’ll walk through how the Corelight App leverages Splunk’s Common Information Model (CIM) to enhance users' search experience when they are using Corelight data.

How To Spot a Catfish Online

As people use social media and dating apps to connect with others, they risk falling victim to catfishing scams. However, catfishing can be easily spotted when looking for signs such as a request for money and a newly made account. It is best to know these signs to avoid any financial loss, data leaks or mental and emotional strain. Continue reading to learn more about what catfishing is, how dangerous it can be, the signs to look out for, how to deal with it and how to avoid it in the future.