Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Importance of Analytical Testing in Cybersecurity

Today, cyber threats evolve at a breakneck pace, and the significance of analytical testing in cybersecurity is a major bulwark against these threats, vital for organizations aiming to protect their data and systems from sophisticated cyberattacks. Analytical testing in cybersecurity involves a series of systematic assessments designed to detect and mitigate vulnerabilities in an organization's cyber infrastructure. It incorporates different types of validity, such as content, construct, and criterion. Ultimately, it can ensure a comprehensive evaluation of security systems.

Has your personal data been breached on the dark web?

The dark web can feel like a mysterious underworld, a hidden corner of the internet where there are no rules. It’s a place where stolen data gets traded, and cybercriminals plot their next attacks. Just because it’s dark, that doesn’t mean you have to be blind to the threats lurking there. That’s where ManageEngine Log360 comes in with a powerful new integration for Constella Intelligence.

RSA 2024: The Art of Possible

“The best part of RSA is all the amazing people in the community trying to make the world a safer place. It’s also very exciting to see all the innovation to make adversaries’ lives harder – competition and collaboration make us better.” – CEO & Co-Founder Dr. Aleksandr Yampolskiy The SecurityScorecard team has just returned from an incredible week in San Francisco at RSA Conference 2024!

SecurityScorecard and Intel: Digging Past the Surface for Enhanced Protection

Threat actors have responded to better protections in the operating system and improved endpoint detection and response (EDR) capabilities by moving down the stack to find entry points with full visibility and privileges into the stack above.

Google Cloud affected by CVE-2021-30476

CVE-2021-30476 affects HashiCorp's Terraform Vault Provider and involves incorrect configuration of bound labels for GCP (Google Cloud Platform) authentication. This issue permits unauthorized users to potentially bypass authentication mechanisms. The vulnerability stems from the Vault provider not correctly configuring the bound labels within the GCP authentication method, which could lead to improper access control.

AppSec spring cleaning checklist

Something about the springtime sunshine and blooming flowers inspires many of us to start cleaning. For some, it might be tackling the backyard shed that accumulated cobwebs over the winter or that overflowing junk drawer in the corner of the kitchen. As you survey your home and yard and decide where to start cleaning, it’s also a great time to look at your application security program and see if any of your existing processes need some tidying up. Here are a few great places to start.

Deciphering the SIEM Puzzle: How to Choose the Ideal Solution

Register for the Webinar Large-scale cyber breaches continue to dominate headlines, amplifying the damaging ramifications of failing to secure your organization. Even with a substantial investment in your SOC, outcomes continue to fall short of promises. Breaches lead to massive data leaks, steep financial losses, and tarnished reputations, underscoring the urgent need for effective SIEM technology.

SafeBreach Coverage for AA24-131A (Black Basta Ransomware)

On May10th, Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) issued an urgent advisory about malicious threat activity involving the Black Basta ransomware variant. Detailed information about these threats and the associated IOCs and TTPs can be seen on #StopRansomware: Black Basta.

Hardening Systems through Security Benchmarks

System hardening is the process of configuring a system to a more secure state. Many technology solutions are not securely configured by default, so system administrators must harden systems while retaining their desired functionality. Thankfully, system administrators do not have to figure out system hardening on their own. Instead, they can reference security benchmarks which describe recommended secure configurations for a system.