Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Netskope Threat Coverage: WhisperGate

A new destructive malware called WhisperGate was discovered in mid-January 2022 targeting Ukrainian organizations. This threat emerged during geopolitical conflicts in Ukraine, masquerading as ransomware. However, this malware has a more destructive nature: wiping files and corrupting disks to prevent the OS from loading. Ukraine has suffered other cyberattacks that seem to be connected to WhisperGate, such as the defacement of many websites connected to their governments.

Unifying AWS IAM Access Across Multiple AWS Accounts and Products

AWS Identity and Access Management (IAM) is a keystone to accessing AWS accounts, but as companies grow, it can be difficult to understand and standardize, especially across many AWS accounts. To put some personality into the challenges of managing identity for multiple AWS resources and accounts, I’ll start with a short story about a fictional company that you might recognize as similar to the one you work in today! ACME Net is growing fast.

Detecting CVE-2022-21907, an IIS HTTP Remote Code Execution vulnerability

In January 2022, Microsoft disclosed a remote code execution vulnerability for Internet Information Server (IIS) identified as CVE-2022-21907, which they have subsequently reported as wormable. Through Microsoft, Corelight Labs was able to review a proof of concept for an attack against the vulnerability. This blog presents an open source detection method that Corelight Labs is releasing to detect exploit attempts of CVE-2022-21907.

Cybersecurity Laws - Get Ready Today to Save Some Money Tomorrow

It looks likely that the UK will join a growing number of nations promoting cybersecurity’s importance for businesses including the introduction of new laws. Amongst the proposals being considered are adding new powers to the UK Cyber Security Council that could significantly change the reporting requirements associated with security incidents. From what has been shared to date, two points that stand out are as follows.

Devo's Use Case-Driven Approach to Accelerate SIEM Time to Value

Organizations cannot wonder if a data breach will happen — they must prepare for when that day comes. Early detection is key to mitigating an attack when it inevitably occurs, but how can CISOs ensure their teams can sift through all the noise they encounter in the SOC to spot malicious activity? Security information and event management (SIEM) technology can play a critical role in empowering your security team to detect potential indicators of compromise faster.

Integrating Cybersecurity Into Your Business's Security Strategy

The way business leaders are constructing their security strategies is transforming. Cybersecurity is at the forefront of modern security operations and must be integrated into any successful overarching security strategy. So how can you better integrate cybersecurity into your business’s general security strategy? Here we’ll explain the ways you can seamlessly integrate digital and physical security to better protect your business.

Are You in Control of Your Personal Information?

Protecting your personal data while participating in an increasingly online community can be challenging. When the wrong people get a hold of personal information, it can lead to identity theft and other costly crimes which can haunt individuals for years. However, consistently applying a few commonsense privacy practices will help you to avoid unnecessary time, expense, and trouble.