Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Most Recent Credential Stuffing Attacks on Companies in 2024

So far in 2024, many major companies have fallen victim to credential stuffing attacks. Some of these notable credential stuffing victims include Roku, Okta, General Motors and Levi’s. Credential stuffing attacks occur when a cybercriminal uses stolen login credentials to attempt to log in to multiple accounts simultaneously. Since many people reuse their passwords, cybercriminals can use stolen credentials to sign in to many accounts, compromising employee, customer and organizational data.

LLMs Gone Wild: AI Without Guardrails

From the moment ChatGPT was released to the public, offensive actors started looking to use this new wealth of knowledge to further nefarious activities. Many of the controls we have become familiar with didn’t exist in its early stages. The ability to request malicious code or the process to execute an advanced attack was there for the asking from an open prompt. This proved that the models could provide adversarial recommendations and new attacks never before seen.

Fundamentals of GraphQL-specific attacks

Developers are constantly exploring new technologies that can improve the performance, flexibility, and usability of applications. GraphQL is one such technology that has gained significant attention for its ability to fetch data efficiently. Unlike the traditional REST API, which requires multiple round trips to the server to gather various pieces of data, GraphQL allows developers to retrieve all the needed data in a single request.

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition covers the SuperShell malware targeting Linux SSH servers, an in-depth analysis of three Chinese-linked clusters responsible for cyberattacks in Southeast Asia, and CitrineSleet exploiting a zero-day Chromium vulnerability.

How To Use USB Blocking To Prevent Data Leaks

As digital threats evolve, safeguarding sensitive data has become more important than ever, especially for businesses using removable storage devices like USB drives. While these external devices boost productivity, they also increase the risk of data breaches if not properly managed. Unprotected peripheral ports serve as unguarded entry points for data thieves and malicious software, highlighting the critical need to secure these access interfaces.

Guidelines For Determining the CUI Decontrol Eligibility

One of the biggest burdens on any government agency or contractor is dealing with controlled unclassified information, or CUI. This information requires oversight, security, access control, and record-keeping – all part of the general “control” of that information – and keeping track of it all can be a huge task. One way in which this task is made easier is through the process of decontrol.

Completely Free Website Builder: Finding the Best WordPress Solution

In today's digital world, having an effective website is crucial for any individual or business. Whether you're a blogger, a small business owner, or a freelancer, creating a professional online presence can significantly impact your success. If you're searching for a completely free website builder, WordPress combined with Elementor stands out as an exceptional choice. This article delves into why WordPress with Elementor is a top pick for a free website builder, exploring its features, benefits, and how you can leverage it to build a stunning website without spending a dime.