Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The Pitch That Earned Vonahi 1 of The Top 3 Pitch IT Finalist Spots

16 weeks of preparation in the ConnectWise PitchIT acceleration program comes down to this 5-minute pitch. On August 31st Vonahi presented their solution in front of partners, judges, and the MSP community for the chance to make it to the top 3 finalists. Winning this round gives Vonahi the chance to present vPenTest on center stage at The IT Nation Connect conference in front of +3,000 attendees.

How to unite security and compliance in 5 simple ways

We have entered the era of data compliance laws, but regulations have not quite caught up to the level of risk that most organizations are exposed to. Uniting security and compliance is crucial to maintaining regulation standards and ensuring a secure environment for your business. Digital transformation and the rollout of new digital tools are moving faster than the speed of litigation. For example, many industries are utilizing connected IoT tools that significantly increase attack vectors.

Ransomware Trends in 2022H1: State-Sponsored Ransomware, New Popular Targets and Evolving Extortion Techniques

Throughout the first half of 2022, Vedere Labs published analyses of prominent ransomware families, such as Conti, Night Sky and ALPHV. We also examined well-known ransomware incidents such as the attacks on the NFL’s SF 49ers by the BlackByte group; on a UK water utility, where the Clop gang managed to access their SCADA system; and on an NHSsoftware provider, where an unknown group managed to disrupt healthcare services in the UK for weeks.

Buy Now Pay Later (BNPL): Prevent fraud using AML and KYC checks

Buy now and pay later (BNPL) services are the latest trend in the market, which is catching up with consumers and retailers quickly. Unfortunately, even the perpetrators are increasing in this system which have a potential to cause harm to a raising solution in finance. This blogs discusses how BNPL fraud can be prevented using Digital Verification Solutions like Identity Verification, AML screening, Digital Onboarding and Document Verification.

Set, Triage, and Improve: Strategies for Tuning Out False Positives

As a security analyst in a growing company, it is often easy to get into the “set it and forget it” mentality. You create one alert after another. Then another. And another. With each alert comes a certain amount of work for an analyst. Analyst time costs money, and some alerts consume more time than others. If most of the alerts result in false positives, a large amount of resources are being spent unnecessarily.

How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money

Onna Technologies, a data centralization software company, integrates security across every facet of their development process by using Snyk and Sysdig. We recently sat down with Onna’s Brent Neal (Director of Security), Mike Hoffman (Lead Security Engineer), and Andrew Leeb (Senior Software Engineer) to discuss data protection and compliance, cloud security priorities, and the benefits using Snyk and Sysdig for complete end-to-end container security.

Chiseling In: Lorenz Ransomware Group Cracks MiVoice And Calls Back For Free

The Arctic Wolf Labs team recently investigated a Lorenz ransomware intrusion, which leveraged a Mitel MiVoice VoIP appliance vulnerability (CVE-2022-29499) for initial access and Microsoft’s BitLocker Drive Encryption for data encryption. Lorenz is a ransomware group that has been active since at least February 2021 and like many ransomware groups, performs double-extortion by exfiltrating data before encrypting systems.