Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The anatomy of an arbitrage betting bot

In gaming and betting, it is said that the house always wins. However, some bettors are constantly looking for loopholes to guarantee a profit no matter the outcome of their bets. They have even developed sophisticated software tools to help with a controversial tactic called arbitrage betting, which costs the industry millions each year.

Forrester recognizes Synopsys as a leader in Software Composition Analysis

Black Duck ranks highest in Strategy and receives highest possible scores in Product Vision, Market Approach, and Corporate Culture criteria. This week, Synopsys was named a Leader in “ The Forrester Wave™: Software Composition Analysis, Q3, 2021 ,” by Forrester based on its evaluation of Black Duck, our Software Composition Analysis solution. Forrester evaluated 10 of the most significant SCA providers against 37 criteria.

Hunting for Detections in Attack Data with Machine Learning

As a (fairly) new member of Splunk’s Threat Research team (STRT), I found a unique opportunity to train machine learning models in a more impactful way. I focus on the application of natural language processing and deep learning to build security analytics. I am surrounded by fellow data scientists, blue teamers, reverse engineers, and former SOC analysts with a shared passion and vision to push the state of the art in cyber defense.

Enable multi-factor authentication for Outlook Web App logins and secure enterprise emails

In March this year, organizations employing Microsoft Exchange were in for a shock when Microsoft announced that a hacker group was gaining access to organizations’ email accounts through vulnerabilities in its Exchange Server email software. The group tried to gain information from defense contractors, schools, and other establishments in the U.S.

Detect security threats with anomaly detection rules

Securing your environment requires being able to quickly detect abnormal activity that could represent a threat. But today’s modern cloud infrastructure is large, complex, and can generate vast volumes of logs. This makes it difficult to determine what activity is normal and harder to identify anomalous behavior. Now, in addition to threshold and new term –based Threat Detection Rules , Datadog Security Monitoring provides the ability to create anomaly

What is a SOC 2 Report and Why Is It Important

A Service Organization Controls (SOC) report provides independent validation over a company’s internal financial reporting controls. They were originally used to validate compliance with the Sarbanes-Oxley Act of 2002. When the SEC released the “ Commission Statement and Guidance on Public Company Cybersecurity Disclosures ,” SOC reports started to include cybersecurity. Understanding what a SOC Type 2 report is can give insight into why it is important to your organization.

Practical maritime OSINT

Advancing telecommunications positively affects the maritime industry. The industry is more organized and well-connected; however, the rising technology brings new challenges and vulnerabilities. Although flags and semaphores are still applicable in some cases, most communications are radio-based. Vessel traffic service (VTS) tracks maritime traffic similar to what the air traffic controller does for aircraft; the VTS receives vessel information via the AIS system .

Detectify Teams up with Hackers for Change

STOCKHOLM — Aug. 18, 2021 — Detectify , the SaaS security company powered by ethical hackers, today announced its partnership with Hackers for Change. The collaboration will equip non-profit organizations with the tools required to strengthen security and decrease the likelihood of cyber-attacks, supporting the mission of Hackers for Change to provide charities and nonprofits with industry-quality cybersecurity services at no cost.