Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

An Actionable Guide to OWASP MASVS V2 (+ Practical Examples)

In an era of digital innovation and technological advancements, robust application security has never been more crucial. As cyber threats continue to evolve, organizations must stay ahead of the curve to protect their sensitive data and maintain the security of their users. One project that can help in this process is OWASP (Open Web Application Security Project), a globally recognized non-profit organization dedicated to improving application security.

Role-based Access Control vs Attribute-based Access Control: Which to Choose

Access management is a fundamental element of your organization’s security infrastructure. With numerous approaches to implementing an access management system, selecting the most suitable one for your organization may be daunting. In this article, we analyze the two most popular access control models: role-based and attribute-based. We delve into what RBAC and ABAC are, review the pros and cons of each model, compare them, and check if it’s possible to combine them.

How to Use the Terraform Destroy Command to Control Cyber Attack Damage

In many cases, cutting something off is necessary to avoid bigger damage. This is the idea behind controlled infrastructure removal, the elimination of some parts of your cloud infrastructure to contain an attack or remove a potential attack surface. It is an important part of infrastructure-as-code (IaC) management and something organizations need to be familiar with as they secure their cloud environments and the apps they develop.

Understanding Access Control Entry and Types

Access Control Entry (ACE) is data within an access control list detailing the access privileges assigned to an individual user or a collective group of users. In the Access Control Entry system, an identification (ID) distinguishes each ACE and identifies the specific individual or group of subjects. Each access control entry includes: An Access Control List (ACL) is similar to an organized list of rules that determine who can do what.

Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling

Netskope Threat Labs is tracking multiple phishing campaigns that abuse Cloudflare Workers. The campaigns are likely the work of different attackers since they use two very different techniques. One campaign (similar to the previously disclosed Azorult campaign) uses HTML smuggling, a detection evasion technique often used for downloading malware, to hide the phishing content from network inspection.

Challenges of Adopting Zero Trust

The world has changed. With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, and more, every organization’s attack surface has expanded and businesses are finding it harder than ever to protect their networks and digital assets. This will undoubtedly be the central theme for this year’s Cybersec Europe.

New Charlotte AI Innovations Enable Prompt Collaboration and Demystify Script Analysis

Since CrowdStrike Charlotte AI became generally available, we’ve seen firsthand how genAI can transform security operations, enabling teams to save hours across time-sensitive tasks and accelerate response to match the speed of modern adversaries.