Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Stratoshark: Extending Wireshark's legacy into the cloud

There is nothing more exciting (or nerve-wracking) than sharing something you’ve created with the world. Over 25 years ago, we started working on Wireshark. For us, it has always been more than just a piece of software — it’s how we met, how we began our careers, and how we learned to solve problems that once seemed insurmountable.

Introducing 1Password Marketplace: Your hub for all 1Password integrations

Starting now, you can find every supported integration in the 1Password Marketplace, including those for 1Password Extended Access Management, Passage by 1Password, 1Password Developer, and (of course) the world’s most trusted password manager.

Malvertising Campaign Abuses Google Ads to Target Advertisers

Researchers at Malwarebytes are tracking a major malvertising campaign that’s abusing Google Ads to target individuals and businesses interested in advertising. The threat actors are using compromised Google Ads accounts to run ads that impersonate Google, leading victims to a fake Google login page designed to steal their credentials.

CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats

The process of crafting new malware detection features is usually time-consuming and requires extensive domain knowledge outside the expertise of many machine learning practitioners. These factors make it especially difficult to keep up with a constantly evolving threat landscape. To mitigate these challenges, the CrowdStrike Data Science team explored the use of deep learning to automatically generate features for novel malware families.

CIS Control 05: Account Management

Knowing who has credentials, how those credentials are granted, and how they are being used is the foundation of any secure environment. It begins with user accounts and the credentials they use. Maintaining a thorough inventory of all accounts and verifying any changes to those accounts as authorized and intentional vs unintended is paramount to establishing a secure environment, and this includes service accounts.

IDC highlights the business value of Vanta

More than ever, business growth is reliant on proving security and compliance. According to Vanta’s State of Trust Report, nearly two-thirds (65%) of organizations say that customers, investors, and buyers require proof of compliance. ‍ GRC and security teams are on the frontlines managing these requests. Yet these teams are too often under-resourced and burdened with processes and systems that waste their time.

Understanding the EU's Cyber Resilience Act (CRA)

The Cyber Resilience Act (CRA) introduces a much-needed framework for standardizing the cybersecurity practices of companies operating in the European Union (EU). The regulation sets clear expectations for hardware and software manufacturers, developers, and distributors, outlining how they should manage and address vulnerabilities at every stage of the product lifecycle.

How to Prevent a Subdomain Takeover in Your Organization

When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource ethical hacker Thomas Chauchefoin, while expired and forgotten subdomains can easily become an entry point for an attacker to steal sensitive data and launch phishing campaigns, having the right tool in place can keep them at bay.

Understanding the Importance of Code Review in Software Development

In today's fast-paced software development market, it is critical to ensure that your code not only works but also functions correctly. That's where code review comes in-it's an important step in ensuring your code's quality, security, and performance. Development teams that thoroughly evaluate code can uncover errors and issues early on, identify potential modifications, and maintain high project standards.