Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Improving Energy Efficiency and Resource Allocation with Advanced Facility Management Software

In an era where sustainability and cost-efficiency are paramount, organizations across industries are seeking innovative ways to optimize their operations. One powerful tool that has emerged as a game-changer in this quest is advanced facility management software. This technology is revolutionizing how businesses manage their physical assets, allocate resources, and improve energy efficiency. Let's explore how cutting-edge facility management solutions are driving significant improvements in these critical areas.

OpenSCAP Hardening Guide in 2024

The OpenSCAP (Security Content Automation Protocol) project offers an extensive range of hardening guides, configuration baselines, and tools for assessing vulnerabilities and configuration issues, utilizing SCAP as the protocol for storing the foundational data. Created by the open-source community, OpenSCAP hardening allows a selection of a security policy that aligns with an organization’s needs, irrespective of its size.

Nightfall AI selected as 2024 SC Awards Finalist

Nightfall AI has been recognized as a 2024 SC Award finalist in the Trust Award categories for Best Data Security Solution and Best Insider Threat Solution. Celebrating its 27th year, the SC Awards recognize the solutions, organizations, and individuals that have demonstrated exceptional achievement in advancing information security.

How CISO as a Service can Improve Your Security Posture and Reduce Costs

Cybersecurity is a critical and complex challenge for every business in today’s digital world. However, not every business has the resources, expertise, or time to manage its security effectively and efficiently. That’s where CISO as a Service comes in. CISO as a Service is a flexible and scalable solution that provides you with access to a dedicated and experienced Chief Information Security Officer (CISO) and their team of security professionals.

Beyond Snapshots: The Need For Continuous Penetration Testing

By James Rees, MD, Razorthorn Security Times must change (and always will) and nowhere is this more true than in the realm of technological advancement. Thirty years ago, the technological landscape was vastly different from what we have today and technological change has outpaced Moore’s Law for some time now. Information security must keep pace with these advancements. This has become especially true with the advent of AI.

What You Need to Know About the ISOO CUI Registry

We’ve written a lot about various security frameworks, from CMMC to ISO 27001, and throughout all of them, one of the core elements is the need to protect CUI. Information that is controlled at a very high – SECRET, Classified, or other – level is tightly bound by specific rules and can only be handled by select individuals. Completely base, public information is freely available and completely uncontrolled. But there’s a lot of information somewhere in the middle.

Meduza Stealer: Detailed Analysis of its Features, Capabilities, and Recent Updates on Active C2

The Meduza Stealer, a malware designed for comprehensive data theft, first appeared on dark web forums on June 12, 2023. It was introduced by a mysterious actor known only as 'Meduza,' with prices ranging from $199 to $1199. Since its emergence, it has gained attention across cybercriminal communities for its potent capabilities.

US CERT Alert AA24-242A (RansomHub Ransomware)

On August 29, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) issued an urgent advisory warning security teams about known RansomHub ransomware IOCs and TTPs identified through FBI threat response activities and third-party reporting as recently as August 2024. Detailed information about this threat and the associated IOCs and TTPs can be seen in the advisory #StopRansomware: RansomHub Ransomware.