Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Stories from the SOC - DNS recon + exfiltration

Our Managed Threat Detection and Response team responded to an Alarm indicating that suspicious reconnaissance activity was occurring internally from one of our customer's scanners. This activity was shortly followed by escalating activity involving brute force activity, remote code execution attempts, and exfiltration channel probing attempts all exploiting vulnerable DNS services on the domain controllers.

10 steps to cyber security for your business

In this article, you will understand what cyber security entails and the breakdown of NCSC’s 10 steps to cyber security that you must know. During our third party security validation exercises or customer communication, we have often come across customers without an answer to ‘what actually their IT and security products are protecting’. It is vital to be aware of what is important, what to protect and how to protect before shopping for security products.

Weekly Cyber Security News 12/03/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. I’m not going to make any snappy and witty remark over this one as I feel the horror everyone must have felt seeing the photos and aftermath. We never hope to have to enact a DR plan, and after being there many years ago when I had to, believe me it is not fun even when prepared.

The biggest bot threats to your brand in 2021

In our recent webinar Netacea’s Head of Threat Research, Matthew Gracey-McMinn and Head of eCommerce, Thomas Platt, delved into the top threats set to shape the bot landscape in 2021. 2020 saw an increasing number of bot-based attacks as everything moved online. From online shopping to working from home, the pandemic has changed the way we interact, communicate and consume. As internet activity increased, so did the opportunity to exploit users.

Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security

A huge portion of today’s corporate network is made up of mobile endpoints, such as laptops, tablet computers, and mobile phones. These are domain-joined and non-domain devices that require access to corporate assets to carry out everyday operations.

A plea to small businesses: Improve your security maturity

Never have I been so compelled to help educate small businesses on the need for cybersecurity. On Saturday morning, March 6, 2021, I awoke to the Wall Street Journal article describing the Hafnium attack. This attack on Microsoft Exchange Servers was shared publicly on March 2nd with a patch for the issue released on Wednesday, March 3rd. This patch appeared to spark action from the hacker who ramped up and automated their attack for maximum scale.

Hitting Snooze on Alert Fatigue in Application Security

Medical devices, subway car doors, severe weather warnings, heavy machinery, car alarms, software security alerts. They all notify you to indicate that something is wrong so that you can take action to prevent harm. Hospital monitors can detect a wide range of issues, from an incorrect dose of medication to an irregular heartbeat and beyond. They can quite literally save a life. The same goes for severe weather alerts that warn of impending tornadoes or hurricanes.

Onboarding in the Digital age & two must-haves in your tool kit

If COVID-19 pandemic has made anything obvious to the business community, it is that riding the digital wave is no longer an option for businesses to thrive in the long-run. While several giant enterprises have already switched to a completely remote set up, laggards are still trying to figure their way around justifying such a move. For smaller organizations, however, investing in a digital-first future might not be as easy.