Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Telecom Providers Can Bolster Identity Security to Meet the UK TSA

As technology evolves, so do the threats that loom over our communication infrastructure. The rollout of 5G, the rise of artificial intelligence (AI) and our ongoing dependence on these networks combine to make the telecommunications industry a prime target for cyberattacks.

The Benefits of Using a Unified Platform for Incident Response

In today's rapidly changing cybersecurity landscape, swift and effective incident response is pivotal. Traditional incident response approaches, involving disparate tools and isolated processes, have proven inadequate to the task. That's where unified platforms come into play—a comprehensive approach to incident response that streamlines and centralizes the entire process.

CVE-2023-38547 & CVE-2023-38548: Two Critical Vulnerabilities in Veeam ONE

On November 6, 2023, Veeam published security hotfixes for two critical-severity vulnerabilities impacting Veeam ONE. At this time, Arctic Wolf has not identified active exploitation of either vulnerability, nor a published proof of concept (PoC) exploit. Although threat actors have not historically targeted Veeam ONE products, obtaining RCE on the monitoring and analytics platform will likely increase the potential for threat actors to create a working PoC exploit and attempt exploitation.

Monitor expiration events from Azure Key Vault

For customers using Azure Key Vault—which helps them safeguard sensitive keys and secrets used by applications and services hosted on Azure—it can be challenging to determine when the resources in their Key Vault(s) are about to expire. Invalid keys and secrets can disrupt your day-to-day workflows by causing application downtime, holding up incident investigations, invalidating compliance, slowing down the development of new features, and more.

Collect Google Cloud Armor logs with Datadog

As the internet continues to evolve, cybersecurity threats—particularly Distributed Denial of Service (DDoS) attacks—are an increasingly significant concern for organizations. In this post, we’ll look at how you can use Datadog to collect Google Cloud Armor (GCA) logs and detect and respond to potential DDoS attacks in real-time. But first, we’ll briefly cover what DDoS attacks are and how they work.

What is Adaptive Security (Definition and Implementation)

Adaptive security is an approach to cybersecurity that helps your Security Operations Center (SOC) quickly adapt to the latest threats. By implementing adaptive security, your organization can evaluate and analyze behaviors and events in real-time to take preventative action before a breach.

Scalpers Force Barbie Collectors to Pay up to 1,200% More for Stevie Nicks Doll

Scalpers aren’t just interested in snagging the final Yeezy drops, the newest Air Jordans or tickets to see Taylor Swift on tour. They’ve also been saying “Hey, Barbie” to the latest Mattel collaboration with rock icon and Barbie enthusiast Stevie Nicks. Evidence gathered by Netacea suggests that scalper bots were involved when pre-orders for the limited-edition Stevie Nicks Barbie, unveiled by the Fleetwood Mac legend during a recent concert, sold out almost immediately.

3 Best Third-Party Risk Management Software Solutions in 2023

From U.S. executive orders to cyber regulations, prominent cybersecurity policies are increasing their inclusion of Third-Party Risk Management standards, and for good reason - every organization, no matter what size, is impacted by third-party risks. If you're looking for a TPRM software solution to enhance the efficiency of your TPRM program, this post will help you evaluate the top contenders in the market.

Fraud Prevention Tips

To prevent becoming a victim of fraud, you should always keep your data in a secure location, protect your online accounts with strong passwords and Multi-Factor Authentication (MFA), sign up for a dark web monitoring service to receive dark web alerts, learn to spot phishing scams and more. Continue reading to learn more about fraud prevention tips you should be following.

City of Huber Heights Targeted by Ransomware Attack Sunday

The City of Huber Heights is in east Ohio, north of Dayton. The suburban area has a population of around 50,000, but other populated areas are nearby. Sunday morning, November 12th, 2023, the City of Huber Heights was subject to a ransomware attack; the investigation is ongoing, as the attack disrupted many City divisions.