Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How to Protect Customer Data in Zendesk - Part 3: Using Nightfall to protect critical stakeholder data

Nightfall’s Cloud DLP platform helps you limit access to sensitive data, by protecting the data where it is stored. With Nightfall you can redact, delete attachments, or make the data private in one click or via automated actions.

What is the difference between XDR and SIEM?

Over the past twenty years, security information and event management (SIEM) platforms have been one of the key solutions for cybersecurity management, as they help security teams centralize attack and threat detection activities. The cybersecurity industry is now shifting towards a new type of solution known as extended detection and response (XDR). As the two technologies are similar and have overlapping capabilities, many people still don’t know how they differ.

White Phoenix: Beating Intermittent Encryption

Recently, a new trend has emerged in the world of ransomware: intermittent encryption, the partial encryption of targeted files. Many ransomware groups, such as BlackCat and Play, have adopted this approach. However, intermittent encryption is flawed. In this blog post, I will introduce White Phoenix, a tool my team built that takes advantage of the fact that those files aren’t entirely encrypted and can, in the right circumstances, salvage some content from the unencrypted parts of the files.

The Role of WAAP Platforms in the CI/CD Pipeline

Most SaaS engineering teams use the CI/CD pipeline for software development. Since a CI/CD approach enables faster, more collaborative, and more efficient development processes, leading to higher-quality software. No wonder that this is popular. More frequent release cycles mean more opportunities for vulnerabilities to creep into the code. While DevOps teams are central to running a CI/CD pipeline, since application security is gaining importance, more engineering teams are adding DevSecOps teams.

More than 780k Brightline Patients Exposed in Serious Data Breach

Brighline is a virtual counseling service that provides help to children, teenagers, and whole families. This pediatric counseling service offers a range of mental health care services to patients throughout the world. Brightline stores a significant amount of personal data to maintain these patient records and offer reliable care, but the company recently suffered from a dangerous data breach, exposing hundreds of thousands of patient records to the internet.

Application Vulnerability Management demo

Application Vulnerability Management provides continuous, real-time vulnerability detection across applications in production. See how you can use Application Vulnerability Management to identify, prioritize, and resolve high-impact vulnerabilities exposed in production, without any performance overhead.

Zenity Helps Microsoft Identify and Remediate Critical Security Risk in Power Automate Desktop

About seven months ago at Defcon, Zenity CTO Michael Bargury presented security research that discovered and outlined a way to take over Microsoft Power Automate enabling bad actors to send ransomware to connected machines by using Power Automate as it was designed. By simply taking over an endpoint, our research showed that attackers can run their own payloads and execute malware by assigning machines to a new administrative account using a basic command line.

Supply Chain Compromise: The Risks You Need to Know

Thinking about your own network isn’t enough to keep your business safe and profitable. As more buyers, sellers, and partners collaborate ever more closely across the world, supply chain IT risks are rising with no slowdown in sight. According to the Identity Theft Resource Center, supply chain attacks surpassed malware incidents by 40% in 2022.1 There’s never been more at risk for wide collections of companies that depend on each other.

Cybersecurity for Small Businesses: How to Protect Your Company on a Budget

As a small business owner, you wear many hats. You're the CEO, the accountant, the salesperson, and the HR manager. With so much on your plate, cybersecurity might not be at the top of your priority list. But it should be. Small businesses are a prime target for cybercriminals, and a security breach can be devastating to your company's reputation and financial health. The good news is that there are affordable steps you can take to protect your business.