Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils

On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list. This utility includes a library called liblzma which is used by SSHD, a critical part of the Internet infrastructure used for remote access. When loaded, the CVE-2024-3094 affects the authentication of SSHD potentially allowing intruders access regardless of the method.

Reddit's Matt Johansen on renouncing superhero culture and what comes after "shift left"

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Matt Johansen. Matt is a security veteran who has helped defend startups, the biggest financial companies in the world, and everything in between. Alongside his day job as Head of Software Security at Reddit, he teaches companies how to protect against cyber attacks, and coaches entrepreneurs and CISOs that need help with infrastructure, application, cloud, and security policies. He also writes Vulnerable U, a weekly newsletter that talks about embracing the power of vulnerability for growth.

Unlocking the Future: Brivo's Revolutionary Access Solutions for Every Space

Dive into the world of unparalleled security and convenience with Brivo's cutting-edge access control solutions. Whether it's a commercial estate, a cozy residential space, or a sprawling enterprise, Brivo has the technology to secure every corner. 🔑🌐 In this video, we explore how Brivo's innovative approach is transforming the way we think about access control and smart spaces. From seamless integration to user-friendly interfaces, discover how Brivo serves any facility with ease and efficiency. 🌟

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Today's ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. Organizations must go beyond mere compliance by employing a combination of offensive security tactics and frequent testing. This empowers them to effectively manage organizational exposure and protect critical assets from evolving threats such as ransomware.

ManageEngine PAM360: An overview

PAM360 is a comprehensive solution for businesses looking to incorporate PAM into their overall security operations. With PAM360's contextual integration capabilities, you can build a central console where different parts of your IT management system interconnect for deeper correlation of privileged access data and overall network data, facilitating meaningful inferences and quicker remedies. In this video, our product expert will give you an overview of PAM360 software.

Kerberos v5 Authentication

Kerberos stands as the default authentication protocol facilitating secure service requests between trusted devices within a network. It has been an integral component of Windows Active Directory (AD) environments since the era of Windows 2000. When a user logs into their computer, Kerberos undertakes mutual authentication, ensuring both the user and the server validate their identities.

Shamane Tan on bouncing back - Cyber Security Decoded

With #data growing at an enormous rate and cyberattacks becoming widespread, a #CyberSecurity strategy based around preventing attacks just simply won’t cut it anymore. Prevention alone isn’t enough, so experts are emphasizing the importance of a strategy based on cyber resilience. In other words, it’s important to build a strategy that enables your team to identify threats from bad actors quickly so you can recover your data right away and bounce back.