Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

ESXiargs Ransomware Lessons Learned

Cyber threat actors are becoming more and more efficient. They are targeting software and applications that are used by organizations globally. One recent example of this is the ESXIargs mass ransomware campaign which targeted a zero-day vulnerability in ESXi. So far this year, it has been reported that over 3,000 ESXi servers and countless virtual machines globally have been impacted by this campaign in the last two months.

Developer-centric DAST with Bright Security

Security testing is increasingly viewed as an essential part of the software development lifecycle (SDLC). Traditionally, agile software development has focused on development velocity, rapid market feedback, and delivering high quality products and services. However, software that's vulnerable to cyber attacks is not valuable to end users and creates huge risks for both customers and software vendors. This makes it critical to integrate security testing into the software development process.

Glamourizing fraudsters hurts victims of fraud, and society

We seem to be fascinated by fraudsters, and recent documentaries prove this. The documentary landscape is populated with many fraud-centered stories, such as The Tinder Swindler, Fyre, The Con, Fake Heiress, The Inventor, and many others. Some have even been made into series, such as the story of Elisabeth Holmes in The Dropout, and the story of Anna Delvey in Inventing Anna. We just can’t get enough of it, and who can blame us? These stories are fascinating, entertaining, and engaging.

Microsoft warns accounting firms of targeted attacks as Tax Day approaches

Accountants are being warned to be on their guard from malicious hackers, as cybercriminals exploit the rush to prepare tax returns for clients before the deadline of US Tax Day. US Tax Day, which falls on Tuesday April 18 this year, is the day on which income tax returns for individuals are due to be submitted to the government. Inevitably it's a busy time for accounting firms and bookkeepers who are feverishly collecting necessary documents from their clients.

Send Your SOAR Events to Splunk

During a recent Proof of Concept (PoC) for Splunk SOAR with an existing customer of Splunk Enterprise Security (ES), I was asked if it was possible to send events/containers available in Splunk SOAR to Splunk ES as a Notable Event. While the reverse process of sending ES Notable Events to Splunk SOAR is highly documented, I was surprised to find hardly any documentation about the use case my customer brought up during the PoC. Hence, my cue to write my first ever Splunk blog!

Prepare for Zero-Day Threats in Your Supply Chain

Leading cybersecurity experts Major General John F. Wharton, (US Army ret); Oleg Strizhak, Shell’s Digital Supply Chain Risk Manager; and Sam Curry, the CISO of Zscaler, recently sat down with SecurityScorecard’s President of International Operations Matthew McKenna to discuss how organizations can prepare themselves and their supply chains for zero-day attacks as well as best practices for supply chain risk management.

Common OfferUp Scams to Watch Out For

One of the hottest online trends is auction sites selling everything from toys to cars and items tucked away in a closet. Sites such as Facebook Marketplace, Craigslist, and Decluttr, provide a way for anyone to sell anything. eBay and Craigslist began the craze of selling unwanted household items back in 1995. These sites sought to bring together buyers and sellers in an open and honest marketplace. Both companies expanded rapidly beyond collectibles into any saleable item.

Sysdig Live: Are you prepared for the new SEC Cyberattack Disclosure Guidelines?

🚨�������� �������������� ���� ����������������! 🚨 �������� ������������ ������ �������� ���� ���������� �������� �������� ������ �������� �������� ��������? ⏳ Join us for an upcoming Sysdig Live featuring a panel discussion between industry experts Matt Stamper, CIPP/US, CISA, CISM, CRISC, CDPSE, QTE (CEO, Executive Advisors Group, LLC), Karen Walker (CFO, Sysdig), and Michael Isbitski (Director of Cybersecurity Strategy, Sysdig), as they unpack the upcoming SEC guidelines on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure.

10 Steps to Pain-Free GDPR Compliance

The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users’ personal data, with fines for non-compliance reaching more than €20 million. The GDPR applies to all organizations processing the personal data of European Union (EU) residents. Do you find it daunting to read through the complex articles of this regulation?