Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Compromising SQL Server with PowerUpSQL

If you’re after a toolkit to own Microsoft SQL Server from end to end, what you need is PowerUpSQL. Implemented in PowerShell and as complete as they come, PowerUpSQL has tools to discover, compromise and own just about any SQL system. It’s the whole kill chain in one tool. This article details how to perform the critical attack steps using PowerUpSQL.

Cyber Security Decoded feat. Suzette Kent | Episode 2

Cyber Security Decoded is a series hosted by Head of Rubrik Zero Labs Steve Stone where he sits down with IT and Security luminaries to discuss key findings from the research from Rubrik Zero Labs and expand on the implications and lessons for IT and security leaders and practitioners. In this episode, Steve sat down with the Former Federal CIO for the United States government, Suzette Kent, to discuss the private and public sector partnerships, the "cyber poverty line," and more.

Oakland declares a state of emergency over ransomware attack

The city government of Oakland has declared a state of emergency after it was hit by a ransomware attack. The attack, which began in the evening of February 8th, has forced the city to take all its IT systems offline, and has affected many non-emergency services, including the ability to collect payments, issue permits, and process reports.

5 Vulnerability Shifts You Need to Know for 2023

Since 2017, an upwards trend of vulnerabilities has been observed, reported to, and analyzed by the National Institute of Standards and Technology (NIST). According to the National Vulnerability Database (NVD), there were more than 25,200 vulnerabilities published in 2022, making it another record-breaking year, with an increase of 25% compared to 2021. That’s a five-time increase over the past decade.

Elliptic Curve Cryptography: An Introduction

The mathematical properties and concepts of elliptic curves are used in asymmetric key exchange cryptography schemes. Common applications include: In this article, we’ll take a deep dive into elliptic curve cryptography. We aim to take a digestible, slightly less academic look that still thoroughly explains this technical topic. For something a little lighter, explore our introduction to cryptography.

RFP Software vs. Security Questionnaire Automation

RFPs and security questionnaires make the world of sales and procurement go round. They’re both vital tools to help buyers assess potential relationships with vendors and ensure proper criteria are met before entering into any binding contracts. And while they serve an important role in the sales process, the burden they put on buyers and vendors alike has led to the creation of tools to streamline the process for all involved. Can you use a one-size-fits-all solution?

How Automated Identity Management Can Help Solve the Compliance Puzzle

Have you ever received a puzzle as a gift from a well-intentioned friend? They likely thought something along the lines of, “Hey, this person’s into solving problems — I bet they’d love putting together this bad boy on a rainy day.” The sentiment was spot-on. Puzzles are your thing.