Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What is Mandatory Access Control (MAC) and 7 Ways To Understand When You Need It

Every day, headlines scream about data breaches and cyberattacks. Could your organization be next? If you’re not using Mandatory Access Control (MAC), you’re leaving your sensitive information vulnerable to unauthorized access. The fear is real – 52% of data breaches expose customer information, wreaking havoc on reputations and bottom lines. But what if you could drastically reduce this risk?

The Power of Multifactor Authentication and a Strong Security Culture

The business mantra "employees are our number one asset" is true for many reasons. Including helping protect an organization from cyber threats. An organization can have the finest security technology stack available, employ offensive security measures such as penetration tests, and have a cybersecurity vendor on speed dial in case an incident occurs. However, if its workers are not cybersecurity conscious, all that effort and financial outlay will be wasted.

Acronym Overload: From SOC to MDR and XDR

As offensive security specialists for over 10 years, we have tested countless organisations who believe their SIEM, EDR or MDR provider offers them comprehensive defense, only to find them lacking in fundamental areas. From our experience, some “traditional” in-house, yet adequately resourced, Security Operations Centres (SOCs) can still provide a robust defense, while others struggle to stay on top of emerging threats.

Understanding Out-of-Bounds Memory Access Vulnerabilities and Detecting Them with Fuzz Testing

Out-of-bounds memory access, also known as buffer overflow, occurs when a program tries to read from or write to a memory location outside the bounds of the memory buffer that has been allocated for it. This type of vulnerability is particularly dangerous because it can lead to various issues, including crashes, data corruption, sensitive data leaks, and even the execution of malicious code.

How Multifactor Authentication (MFA) Can Reduce Your Cyber Attacks Risk?

Did it ever cross your mind to ask if your password can defend your sensitive info on the web all by itself? In the digital world of today, where cyber threats are rapidly developing, the traditional way of protecting the system with single password has become more and more insecure. Therefore, it is the user who is more exposed to such cyberattacks. Just to mention, more than 81% of data breaches are associated with weak or stolen passwords.

Three trends shaping software supply chain security today

Building software continues to look like an assembly line, with developers pulling resources from across the web to create applications. Although third-party resources have played an essential role in developing software for many years, the way that development teams use these external components looks different today.

Red Teaming vs Penetration Testing: Understanding the Differences

In today’s rapidly evolving cybersecurity landscape, organisations must stay ahead of emerging threats and vulnerabilities to remain competitive. Two critical approaches to bolster security are Red Teaming and Penetration Testing. While these terms are often used interchangeably, they serve different purposes and employ distinct methodologies. Understanding the differences between Red Teaming and Penetration Testing is essential for implementing an effective cybersecurity strategy.

CVE-2024-28986 & CVE-2024-28987: Follow-Up: New SolarWinds HotFix Addresses Critical Vulnerabilities in Web Help Desk

On August 21, 2024, SolarWinds released a second hotfix for SolarWinds Web Help Desk (WHD) version 12.8.3. This hotfix addresses a newly disclosed hardcoded credential vulnerability (CVE-2024-28987) that allows a remote, unauthenticated attacker to access internal functionality and modify data. Additionally, the hotfix resolves the Java deserialization remote code execution (RCE) vulnerability (CVE-2024-28986) disclosed the previous week and fixes functionality issues introduced by the first hotfix.