Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Stranger Danger: Live hack of how a Log4Shell exploit works

The Log4Shell vulnerability took the Java community by surprise at the end of 2021, and many organizations are still mitigating its impact. To help development teams stay informed as the situation unfolds, Snyk has created and continues to update its Log4j vulnerability resource center.

Simplify Your Journey to SOC Modernization

The discipline of threat intelligence began to be incorporated in cyber defense processes within private sector companies nearly a decade ago. Over the past few years, more and more organizations began to establish their own threat intelligence operations, building Security Operations Centers (SOCs), incident response (IR) capabilities and threat intelligence teams.

How About a Magic Trick? A New Jester In Court

Over the past months, Cyberint Research Team observed a new group that emerged on several underground forums. What seemed to be “yet another info stealer seller” has turned out to be something far more interesting. As the group is named Jester Stealer, that were, at first, selling a fairly sophisticated info stealer (Figure 1). Other evidence suggests that there is much more to it. Cyberint Research Team discovered a developing threat group that gets their claws into whatever they can find.

A Cybersecurity Risk Checklist for Law Firms

The growing wave of cybercrime targets businesses in every industry, and law firms are no exception. With many unique cybersecurity risks, law firms are more onerous to secure than other organizations. In addition to having to fend off threats from cybercriminals, they must also overcome the threat posed by hacktivists and nation-states. Law firms are especially attractive to bad actors because attorneys need access to highly sensitive data to provide legal services.

Sysdig achieves AWS Security Competency

Sysdig today announced that it has achieved Amazon Web Services (AWS) Security Competency status. This crucial designation recognizes the value provided by the Sysdig Secure DevOps Platform to AWS customers to achieve their container and cloud security goals. As a key partner for the ecosystem, Sysdig collaborates closely with AWS and its customers to enhance the protection of cloud infrastructure and applications against continuously evolving security threats.

Datadog Cloud Security Platform

Datadog's Cloud Security Platform—consisting of Cloud SIEM, Posture Management, and Workload Security—delivers real-time threat detection and continuous configuration audits across your applications, hosts, containers, and cloud infrastructure. Datadog derives security insights from your observability data, enabling security and DevOps teams to work together to detect, investigate, and remediate threats.

Insights from an MSP Partner | Jeremy Treister

Egnyte’s Director of MSP Community and Partner Enablement, Eric Anthony, catches up with CMIT Solutions of Chicago’s President, Jeremy Treister, to talk about the advantages and benefits of Egnyte’s MSP program. In this video, Treister discusses some of his favorite features of Egnyte and how they help him keep his users secure. Egnyte is trusted by more than 16,000 content-critical businesses worldwide.

How to threat hunt with mobile EDR

The Lookout Security Platform includes threat hunting capabilities as part of its mobile endpoint detection and response (EDR) solution. Watch Lookout security researcher Apurva Kumar walk through how she uses the Lookout console to investigate a security incident. Learn more about how you can secure your organization with EDR here: lookout.com/products/detection-and-response