Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

7 keysteps for PCI DSS 4.0 readiness assessment

PCI DSS 4.0 Transition may seem like a daunting task for most organizations. However, you can ensure the process is a hassle-free one for you by following certain important tips and guidelines. Organizations need to undergo a PCI DSS Readiness Assessment to embrace the transition from PCI DSS 3.2.1 to PCI DSS 4.0. So, for those looking to conduct this readiness assessment, here are some useful tips that can help you make this assessment and the transition a success for your organization.

One Year of Cyberwarfare: Russia-Ukraine Conflict

While things can sometimes seem “back to normal” in the rest of the world, the devastating war is still going on in Ukraine, affecting millions of innocent civilians. Reflecting on the past year’s suffering of the Ukrainian people, we’d like to summarize the cyber warfare aspect of this conflict. In 2022, Russian government-backed cyberattacks targeted users in Ukraine more than any other country.

LastPass Updates Data Breach Advisory with New Details

On February 27, 2023, LastPass updated their security incident notice to include additional details around the data breach they began investigating in November 2022. According to their notice, the threat actor used information obtained in an earlier, August 2022, data breach to target an employee and obtain credentials and keys used to decrypt storage volumes within their cloud-based storage service.

Persistence Techniques That Persist

Once threat actors gain a foothold on a system, they must implement techniques to maintain that access, even in the event of restarts, updates in credentials or any other type of change that might disrupt access. These techniques are collectively known as persistence techniques. In this blog post, we will focus on how malware can achieve persistence by abusing the Windows Registry.