Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Detecting Microsoft Entra ID Primary Refresh Token Abuse with Falcon Next-Gen SIEM

Microsoft Entra ID Primary Refresh Tokens (PRTs) are an attractive target for threat actors because they are long-lived, they are broadly scoped and they often don’t have additional multifactor authentication requirements after they are obtained. In this blog, we will discuss what PRTs are, how they are issued and how recently released research gives threat attackers a new way to obtain them. Finally, we will examine how organizations can detect these attacks using CrowdStrike Falcon Next-Gen SIEM.

When SASE Meets DEM: Revolutionizing the User Experience

In today’s fast-evolving business world, IT Teams must ensure seamless user experiences to stay competitive. As networks grow more complex, IT faces increasing challenges in identifying and resolving performance issues that impact user productivity and satisfaction. Cato Digital Experience Monitoring (DEM) addresses these challenges, helping IT ensure optimal user experiences.

Vital Signs of Software Dependencies: Understanding Package Health

As the vast majority of modern applications rely heavily on open-source software, dealing with updates for dependencies can become a major hassle for both developers and cybersecurity professionals. Every developer knows the pain of an update breaking their application. Manually determining which dependencies to run can become a massive time-suck, which is why many developers fall behind on updates, leaving applications open to vulnerabilities.

Fireblocks Deploys Hashnote's USYC via Off Exchange

Fireblocks now enables customers to use Hashnote’s regulated tokenized money market fund, US Yield Coin (USYC), as a collateral asset on Deribit through Fireblocks Off Exchange. This significant milestone marks the first time a major crypto derivatives exchange is supporting a regulated tokenized money market fund, and the first time this type of token is being used as collateral. USYC is a cross-collateral currency on Deribit.

Fireblocks x Bitbond: Simple, Secure, and Scalable Tokenization for Institutions

Tokenization projects are making significant strides in financial markets, and beyond, by making financial and real world assets more accessible. As the market evolves, institutions require a secure and scalable solution that they can easily build and deploy. In September 2023, Fireblocks bolstered its tokenization capabilities with the acquisition of BlockFold, to provide a complete service layer of advisory, token customization, orchestration, and distribution.

AfterDarkMode Malware: What It Is and How to Mitigate the Risk

Now that AfterDarkMode malware is out there, internet threats are even more complicated and dangerous. That person who is sneaky and hard to catch has shown that they are motivated to get into systems and use weaknesses to their advantage. For businesses to be safe from the AfterDarkMode threat, they need to understand its plans, methods, and procedures and take steps to lower the risk. AfterDarkMode malware is a very advanced and sneaky threat that can take over computers without anyone noticing.

DFIR Bluesky Ransomware: Strategies for Incident Response and Threat Containment

When Bluesky ransomware first appeared, it caused a lot of trouble for businesses of all kinds. This sophisticated and dangerous threat actor has shown that they are determined to stop activities and get money by any means necessary. To mitigate the Bluesky danger, businesses need to take a thorough and proactive approach to handling incidents and keeping threats inside their borders.

Australia Considers Mandatory Reporting of Ransom Payments

New legislation is on the horizon in Australia that is set to change the way businesses deal with ransomware attacks. This law, not unlike the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) in the US, aims to improve transparency when it comes to paying ransoms. There's no question that cybercrime is on the rise in the country.

Five Challenges of National Information Assurance and How to Overcome Them

The National Information Assurance (NIA) Policy is a framework for offering organizations a foundation for information security management. It was designed and developed to aid organizations with the necessary steps to ensure information security, from assessing and classifying risk to choosing and implementing controls for mitigation.