Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

WatchGuard Cybersecurity Predictions Challenge 2023

In 2023, WatchGuard predicts that hackers will try to bypass your cybersecurity defenses using new techniques focused on business processes, identity, and artificial intelligence. This year, Corey and Marc square-off in a Predictions Challenge, offering different takes on potential hacks and attacks in these categories. Whose predictions will come true…only time will tell!

The 443 Episode 221 - Apple's New Privacy Expansion

This week on the podcast, we cover Apple's latest announcement of expanded privacy and security features for their users. Before that, we cover a major breach in the Android ecosystem followed by a new Internet Explorer (yes, that still exists) 0-day vulnerability. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Threat Actors use Google Ads to Deploy VIDAR Stealer

Kroll has observed threat actors abusing Google Ads to deploy malware masquerading as legitimate downloads or software that has been “cracked” or modified to remove or disable features such as copy protection or adware. As part of our analysis of this trend and threat, we have identified specifically that VIDAR malware, an information-stealing trojan, is using Google Ads to advertise spoofed domains and redirect users to fraudulent sites or malware downloads.

How to Deploy Egnyte's Project Templates in 3 Simple Steps to Save Time on Project Set-up

‍ If you're an architect, builder, or engineer, you know that one of the most time-consuming parts of starting a new project is setting up the permissions for each subfolder. You must set the permissions for the same folders over and over again for every new project, which can really start to eat into your billable hours. Fortunately, there's a way to save yourself some time by using project templates.

Gaming Industry: The Need For CyberSecurity (Protocols)

Gaming is the largest entertainment industry worldwide, with a market worth over $197 billion USD in 2022. The pandemic has caused an enormous 26% surge in growth in 2019 and 2021 as users attempted to break up the monotony of lockdowns and stay close to friends and family. This large and growing industry where cash and data are exchanged online is a draw for nefarious actors.

OpenAI (ChatGPT) Vulnerability Remediation Concept Work

Kondukto integrates with OpenAI and gets vulnerability remediation advice for all your security testing results on this concept work. OpenAI is an artificial intelligence research laboratory that surprised the world with ChatGPT. It was founded in San Francisco in late 2015 by Sam Altman and Elon Musk, and many others. ChatGPT grabbed 1M people's attention in the first six days, and unbelievable AI & Human conversations screenshots are still getting shared.

GitGuardian Playbooks Overview

GitGuardian Playbooks allow you to quickly and easily automate your incident responses. GitGuardian is proud to offer 3 different playbooks designed to get your team involved in remediating incidents: We would be happy to work with you to create custom playbooks as well. Don't hesitate to reach out to us at contact@gitguardian.com.

Introducing Third-Party Vulnerability Detection

Learn how Bitsight Third-Party Vulnerability Detection empowers third-party risk professionals to find and remediate threats - including major security events - more quickly within their vendor portfolio. Identify exposure and mitigate risk more easily with critical insights into the impact on your organization’s third parties.

BitSight for Fourth Party Risk Management

Learn how BitSight for Fourth-Party Risk Management, helps you uncover deep insights into the most crucial and concentrated risk in your extended vendor network so you can proactively manage and remediate risk. With our latest enhancements, you can address concentrated risk within your extended vendor network in a more scalable and efficient way.

Strengthening Resilience Through MITRE ATT&CK

MITRE ATT&CK is, in both depth and breadth, the most extensive attack knowledge base, providing suggested mitigation techniques, detection procedures, and other relevant technical information. MITRE has expanded the Kill Chain to include a wide variety of tactics that are then supported by specific techniques. This organized approach enables FSIs to select and analyze attacks methodically and compare them to the capabilities of internal security controls to understand the gaps.