Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Audit domain controller logon activity: ADAudit Plus User Logon report

ManageEngine ADAudit Plus is a UBA-driven auditor that bolsters your Active Directory (AD) security infrastructure. With over 250 built-in reports, it provides you with granular insights into what’s happening within your AD, such as all the changes made to objects and their attributes. This can include changes to users, computers, groups, network shares, and more.

Banking & Finance: What is Enhanced Due Diligence(EDD)?

EDD is a vital component of the KYC compliance procedure in banking. It comprises gathering information to verify clients’ identities and assess the degree of money laundering risk that each customer poses. As a result, the client requested substantially more details during the EDD process than during the CDD process, because this information might be used to reduce the related risks.

How Detectify embraces the best of both DAST and EASM

Below, we’ll take a look at how both DAST as a methodology and DAST as a tool relate to what we do at Detectify. More specifically, we’ll explain how Detectify’s solution applies DAST methodology with an External Attack Surface Management (EASM) mindset to deliver the most value to AppSec and ProdSec teams.

It's time to rethink how we market and sell security products

With changing technology, evolving security threats, and the vast number of vendors out there, companies intent on successfully selling their products need new approaches. At the end of the day, it isn’t about convincing someone to buy your product whether they need it or not, but ensuring that your product is the right fit for them and that it will solve their problems—some of which they probably don’t realize they have.

How to Identify and Prevent the Top Software Vulnerabilities in 2023?

Software is an intricate part of our lives, with its presence in nearly every device and aspect of technology. However, the software can also be vulnerable to malicious threats, given that the code within it can contain flaws. As a result, software vulnerability has been on the rise over the years and is likely to continue increasing in 2023. Organizations and businesses alike need to remain proactive about their security measures when it comes to their systems, software, and data management.

OpenSSH Pre-Auth Double Free CVE-2023-25136 - Writeup and Proof-of-Concept

OpenSSH’s newly released version 9.2p1 contains a fix for a double-free vulnerability. Given the severe potential impact of the vulnerability on OpenSSH servers (DoS/RCE) and its high popularity in the industry, this security fix prompted the JFrog Security Research team to investigate the vulnerability. This blog post provides details on the vulnerability, who is affected, and a proof-of-concept to trigger it causing a Denial of Service (DoS).

How To Do Unit Testing In Java

Unit testing is a crucial aspect of software development and helps to ensure that individual units of code are working as intended. In Java, the most popular framework for unit testing is JUnit. In this article, we will go over the basics of how to write and run unit tests in Java using the popular testing framework, as well as some best practices for unit testing.

Top 5 Inadvertent Mistakes of Privileged Users and How to Prevent Them

Your organization most likely has privileged users — employees, subcontractors, and even customers who are authorized to access critical applications and sensitive data. But those elevated access rights make an organization vulnerable. If a privileged user makes a mistake or an attacker gets access to a privileged account, your most valuable data is at risk.