Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Threat Context monthly: Executive intelligence briefing for November 2024

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from November.

FAQ: What Steps Can You Take to Speed Up ISO 27001?

ISO 27001 is one of the most important security frameworks in the world. Any business that wants to operate internationally, especially if they have contracts with certified brands or international governments, or they want to open the door to those contracts, will need to achieve ISO 27001 certification. There’s just one problem: it can take a long time to achieve. How long?

Arctic Wolf Observes Threat Campaign Targeting Palo Alto Networks Firewall Devices

On November 18, 2024, Palo Alto Networks disclosed the existence of two vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in Palo Alto Networks OS (PAN-OS), the operating system used on their firewall devices. A day later, watchTowr released a report providing technical details on how to chain the two vulnerabilities together to achieve remote code execution of these vulnerabilities.

Vulnerability Management as a Service: What Businesses Need to Know

Cyber threats are at an all-time high because the digital world is rapidly changing so quickly. Every day, new vulnerabilities are found in security systems. Attacks threaten businesses of all sizes by stealing data, disrupting operations, and damaging reputations. It has become clear that Vulnerability Management as a Service (VMaaS) is the best way for companies to protect their digital assets without having to manage security systems themselves.

Top 5 PDF Password Protectors to Keep Your Files Safe

As we know, PDF is the most used file format in professional and educational settings. Even sensitive data, like bank statements, are usually shared in a PDF format. Before sending these sensitive files over to the recipient, it is essential to ensure their safety to protect confidential data. By applying a password, you can safeguard your files from data breaches. Therefore, it is a good idea to password-protect your PDF files using a trustworthy protection tool. Read this article till the end, as it features a list of renowned PDF Password Protectors to help you pick a suitable tool.

5 Key Differences Between Proxies and Firewalls

The world has never been this hyper-connected, but here's the bad side: if you are not dealing with one security threat, it's another, from malware and hacking to even lapses by your team. To enhance the protection of sensitive data, you might need more than one tool. Two of the most thrown-around words in this space are firewalls and proxies. To non-tech-savvy eyes, they mean the same thing. But the truth is that they are not!

Increasing Organic Traffic with User-Friendly Site Builders

Creating an effective online presence is vital for businesses and individuals aiming to thrive in a competitive digital landscape. One of the most significant factors in this endeavour is driving organic traffic to your website. User-friendly site builders play a crucial role in achieving this goal by simplifying the web development process while offering tools that enhance visibility and engagement.

The Role of Security Configuration Management in Achieving Zero Trust Security Architectures

Zero Trust is a network security model that dictates that no one or no system should be trusted by default and that every attempt to access a network or application is a threat. For those who are naturally trusting of others, this concept is difficult to accept. However, distrusting every entity on a network until it has been verified is imperative today.

Why you need to augment prevention-only posture with cloud detection and response

In the early days of cloud security, like in the early days of endpoint, the focus was on prevention. This makes sense: preventative measures are an essential way to reduce risk. Blocking known threats and attack paths makes sense as a way to harden an organization’s cloud estate. For many organizations, a prevention-only strategy in the cloud might seem completely sufficient for reducing risk – and it is to an extent. But prevention alone can only go so far.