Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to setup Dynamic Keys in ionCube Encoder

Learn about ionCube’s most powerful feature, Dynamic Keys! In this article we will show you how to add a dynamic key based on a static value as well as the more advanced (and recommended!) non-static dynamic key! If you don’t already know about external and dynamic keys in ionCube then it would be best to start with our summary article to learn about how each feature works. We also show you how to setup a simple external key here.

Understanding Suspicious User Types With UEBA

The cybersecurity threat landscape is evolving rapidly. Hackers and other malicious users are becoming increasingly sophisticated in their attack methods, rendering traditional security tools obsolete. Modern cybercriminals will use any means to break into firewalls, send emails with infected attachments, or even bribe employees to share login credentials. Businesses in all industries must identify and implement comprehensive IT security tools and strategies to protect their valuable assets.

SecureAPlus users upgrade FREE to CatchPulse

SecureAge Technology recently announced the relaunch and renaming of SecureAPlus which is taking place in May 2022. The new upgraded version is now known as CatchPulse. In this post, we would like to share with our existing home customers how this change will affect your SecureAPlus Essentials and Pro installations.

Modernizing SAST rules maintenance to catch vulnerabilities faster

Snyk Code separates itself from the majority of static code analysis tools by generating and maintaining rule sets for its users — helping them combat common and newly discovered threats. A recent Hub article described a new Javascript vulnerability called prototype pollution, which allows attackers to modify, or “pollute”, a Javascript object prototype and execute a variety of malicious actions.

Amazon EC2 SSH Session Recording and Auditing with Teleport

This blog is Part IV in a series about identity-based access management of AWS resources. In Part I, we covered how to use OSS Teleport to access Amazon EC2 instances running in private subnets. Part II explained implementing identity-based access via SSO integration with Okta. Part III covered the steps to configure privilege escalation for just-in-time access requests. In Part IV, we will guide you through the steps to configure SSH session recording and auditing.

The 4 most effective steps to mitigate account theft

The migration of assets to the Cloud has been the common denominator in company business strategies over the last two years, coupled with the rising number of incidents involving the theft of sensitive information and user passwords on Cloud platforms. According to the Verizon Data Breach Report 2021, in 2020 29,207 real-time security incidents were detected, out of which 5,258 were confirmed data breaches.

Night Sky: A Short-Lived Threat from a Long-Lived Threat Actor

In a new threat briefing report, Vedere Labs analyzes the behavior of the Night Sky malware on two samples, presents a list of IoCs extracted from the analysis and discusses mitigation. The Night Sky ransomware was first reported on January 1, 2022. Victims were asked to contact the attackers to pay for the ransom. If the victims refused to pay, attackers threatened to expose their data on a leak site.

Three Benefits Authorization Brings to your Identity Strategy

Organizations today are embracing cloud-native technologies to increase time-to-market, scalability and cost savings. A big part of the cloud-native transition is moving legacy systems and architectures to the cloud. With this comes both complexity and new risks because modern applications are often composed of dozens of microservices, housed in containers and hosted on immutable, dynamically scaling platforms like Kubernetes.