Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Clop Ransomware Likely Sitting on MOVEit Transfer Vulnerability (CVE-2023-34362) Since 2021

NOTE: The MOVEit Transfer vulnerability remains under active exploitation, and Kroll experts are investigating. Expect frequent updates to the Kroll Cyber Risk blog as our team uncovers more details. On June 5, 2023, the Clop ransomware group publicly claimed responsibility for exploitation of a zero-day vulnerability in the MOVEit Transfer secure file transfer web application (CVE-2023-34362).

Millions of Patients Lose Control of Their Personal and Health Data in Harvard Pilgrim Breach

Harvard Pilgrim Health Care is an insurance provider that offers non-profit healthcare to residents in a variety of different states, including New Hampshire, Maine, Connecticut, and Massachusetts. The company generates more than $622 million in revenue annually and employs over 4,400 people during its regular operations. It works with millions of patients, and a mix of those patients was exposed in the recent data breach impacting that company.

Getting Started with SOAR in Mission Control

This video will take a new or existing user of Splunk Mission Control through the process of implementing SOAR playbooks within Mission Control. Splunk Product Manager Kavita Varadarajan will walk you through the necessary steps and configuration to deploy a SOAR playbook at a basic level. Learn how to fully leverage the full power of orchestration and automation to unify your security operations with Splunk Mission Control.

RKVST mitigating insider threats demo

Mitigate insider threats with RKVST. This demo is an example of how with RKVST it's quick and simple to identify who did what when to any asset so you can quickly see if there has been any malicious activity, when it happened and who was responsible. RKVST provenance-as-a-service enables organizations to authenticate data and build trustworthy digital supply chains. It also makes it quick and easy to locate an asset.

AppSec Decoded: Ease of use with Polaris

Learn how the Synopsys Polaris Software Integrity Platform® offers ease-of-use for even the most complex environments. The ongoing mantra of software developers is that they’re happy to include security in their development stream—but only if it doesn’t slow them down. Because the pressure for speed in development trumps the pressure for security. So over the past decade, software security teams have focused enormous energy on achieving that speed, with automated tools and services.

Resource Catalog

Resource Catalog provides visibility and security context directly to DevOps in the same platform they are already using every day to monitor their infrastructure. As a result, DevOps teams no longer have to react to a laundry list of security threats. Instead, they are armed with the insight to vigilantly detect security misconfigurations and reduce the mean time to remediation so that their security posture is strengthened.

How to Stay Safe While Online Gaming

To stay safe while playing online video games, you should follow cyber hygiene best practices to protect your anonymity. Best practices include using strong passwords, using a VPN and keeping your software updated. Read our eleven recommendations for keeping sensitive information secure and protecting yourself while playing online games.

UpGuard Summit May 2023 - Panel Discussion

Join Zindzi Speede, our Technical Customer Success Manager, as she and a panel of cyber security experts delve into topics such as best practices, compliance, and the implications of AI on cyber security. Guests Jacques Van Zyl - Cyber Security Analyst at Youi Insurance Alen Zenicanin - Information Security Officer at Law in Order Michael Viney - Head of IT at Square Peg Capital.