Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cases: A Year in Review

When we launched cases in early 2023, we saw how teams combined automation with their established processes to respond to known threats. And we realized we were missing a place for security teams to address those new or unknown threats. Enter cases, our solution to case management. Over the past year, our cases feature has become a place where teams can collaborate, track, and report on new and existing workflows.

How to Improve Compliance with Multilingual Cybersecurity Resource

Cybersecurity matters a lot today, and it touches everyone around the globe. With hackers becoming smarter, protecting information has never been more critical. Now, imagine trying to stay safe online but not understanding the warnings because they’re not in your language. That’s where multilingual cybersecurity comes into play – it breaks down language barriers so everyone can understand how to protect themselves.

The Challenges of Full Network Visibility and How a Network Digital Twin Can Help

In today’s complex IT environments, maintaining full network visibility is a daunting task. Network segmentation, while essential for security, often complicates the process of obtaining a comprehensive view of the entire network infrastructure. Federal IT departments charged with the responsibility of keeping networks mission-ready, face significant hurdles in visualizing connectivity, ensuring security zone segmentation, and performing complete path searches across segmented domains.

CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the ending was far more devasting. More than 100 organizations were exposed, and many are now grappling with the impacts of data theft and extortion in what some are calling one of the largest breaches in history.

Rapid Data Heist: Akira Ransomware Group's Two-Hour Attack on Veeam Servers

In a startling development, the Akira ransomware gang has demonstrated a dramatic reduction in the time it takes to exfiltrate data from compromised servers. According to the BlackBerry Threat Research and Intelligence Team, this cybercriminal group managed to steal data from a Veeam server in just over two hours during a June attack on a Latin American airline.

What is Hashing and How Does It Work in Cyber Security?

Hashing transforms a key or set of characters into a unique value from the original input, all for cybersecurity data validation and integrity checking. Hashing is a one-way process based on creating a value to associate with a specific data set. Security solutions providers like IDStrong use the highest level of hashing and encryption to protect their users' information. Organizations like IDStrong understand how critical safeguarding their consumer’s credentials is.

CVE-2024-4879, CVE-2024-5178, CVE-2024-5217: ServiceNow MID Server Vulnerabilities Resulting in Unauthorized Code Execution

On July 10, 2024, ServiceNow disclosed a series of critical vulnerabilities impacting their platform, identified as CVE-2024-4879, CVE-2024-5178, and CVE-2024-5217. These vulnerabilities were responsibly disclosed to ServiceNow in May 2024 by Assetnote, a cybersecurity firm. ServiceNow responded by patching hosted instances in June 2024.