Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Hackers Exploit Exposed Selenium Grid Servers for Proxyjacking and Cryptomining

Hackers are increasingly targeting exposed Selenium Grid servers, hijacking them for cryptomining and proxyjacking activities. Selenium, an open-source browser automation tool widely used for web application testing, has become a valuable target for cybercriminals. As these servers often lack proper security measures, threat actors are seizing the opportunity to leverage them for their own gain.

Thwart cyber threats with 11:11 Application and Zero Trust Services.

Cybercrime and ransomware are a way of life, with almost-daily news about new data breaches. 2024 set a record for the largest ransomware payment ever made. According to Forbes, the ransomware group the “Dark Angels” extracted $75 million, the single largest known ransomware payment ever made. And it is only getting worse. This is why we’re adding to our managed security services and trying to make it easier for our customers to combat online threats.

CEL and Kubescape: transforming Kubernetes admission control

Admission control is a crucial part of the Kubernetes security, enabling the approval or modification of API objects as they are submitted to the server. It allows administrators to enforce business logic or policies on what objects can be admitted into a cluster. Kubernetes RBAC is a scalable authorization mechanism, but lacks the fine grained control over different Kubernetes objects. This creates the need for another layer of control which is Admission Policies.

Supercharge Team Productivity with Essential Jira Integrations

Looking to supercharge your team's productivity, optimize project management, and enhance security within Jira? Look no further! Watch the session where six Atlassian Marketplace vendors - Move Work Forward, Reliex, SaaSJet, Release Management, OBoard, and GitProtect.io - united their efforts to share best practices & insider tips for streamlining your workflows and productivity, boosting collaboration, and protecting your Jira data.

CVE-2024-6678: GitLab Fixes Critical Pipeline Execution Vulnerability

On September 11, 2024, GitLab released patches for a critical vulnerability affecting various versions of GitLab CE/EE, identified as CVE-2024-6678. This flaw allows a remote attacker to trigger a pipeline as an arbitrary user under specific conditions. A GitLab pipeline is a collection of automated processes that run in stages to build, test, and deploy code.

What is a WAF (Web Application Firewall)? How does it Work?

As organizations are increasingly relying on web applications, securing them is vital. A Web Application Firewall (WAF) plays a critical role in protecting web apps by filtering and monitoring HTTP traffic between the application and the internet. Unlike traditional firewalls, which safeguard internal networks, a WAF focuses on protecting web applications from threats such as SQL injection, cross-site scripting (XSS) and other vulnerabilities.

Why AI Guardrails Need Session-Level Monitoring: Stopping Threats That Slip Through the Cracks

AI guardrails are vital for ensuring the safe and responsible use of AI/large language models (LLMs). However, focusing solely on single prompt-level checks can leave organizations vulnerable to sophisticated threats. Many company policy violations and security risks can be cleverly split across multiple, seemingly innocent queries. To effectively protect against these threats, a more comprehensive approach is needed — session-level monitoring.

Avast Secure Browser: Browse Privately & Securely | Take Control of Your Online Privacy

What you do online should be your business and your business alone. In today’s digital world, unfortunately, a lot of what you do is tracked by advertisers and hackers. With Avast Secure Browser, you can browse more privately and securely. We help prevent advertisers from tracking you, and collecting your personal data, offering a range of blocking options. Select from Basic, Balanced, or Strict Blocking to customize your level of privacy. Plus, our Password Manager ensures the keys to your digital identity stay secure.

Defend Your Data Against Cyberattacks with Rubrik & CrowdStrike

With the growing volume of data and increasing cost of breaches, organizations must find ways to manage and protect their ever-expanding datasets. To address this escalating threat landscape, Rubrik and CrowdStrike have joined forces to redefine cyber defense with several integration points between our platforms. This video walks you through the latest integration between Rubrik Security Cloud and CrowdStrike Falcon Insight XDR, from installing and configuring, through how the Rubrik data context can be used by a security operator when investigating an incident.