Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Securing Hypervisor Environments: Rubrik Intends to Extend Support for OpenShift Virtualization and Proxmox VE

In today's digital landscape, where data is the lifeblood of any business, securing and protecting hypervisor environments is paramount. Hypervisors, such as OpenShift Virtualization and Proxmox VE, play a critical role in virtualized environments. The threat landscape constantly evolves, with cyberattacks becoming more sophisticated and data breaches rising.

Detecting The Agent Tesla Malware Family

Welcome to the latest from Corelight Labs! This blog continues our tradition of picking a popular malware family from Any.Run and writing a detector for it! Trending consistently at #1 on Any.Run’s malware trends list, Agent Tesla uses multiple protocols to communicate with its C2 infrastructure, making it more difficult to detect robustly than a malware sample utilizing only one network protocol for its C2.

Is It Safe To Accept Cash App Payments From Strangers?

Although using Cash App is a convenient way to receive money from people you already know, Cash App is not safe when receiving money from strangers. Whenever you use a payment app like Cash App, it’s always better to receive money from people you trust to avoid being scammed by a stranger. Other payment apps besides Cash App include PayPal, Venmo, Zelle, Apple Pay and Chime, among others.

Infosys McCamish Systems Ransomware Attack: Over Six Million Customers' Data Compromised

A significant ransomware attack on Infosys McCamish Systems, an outsourcing service provider for financial and insurance companies, has impacted over six million customers. The breach, which took place in late 2023, was only recently disclosed in a filing with the Maine Office of the Attorney General (OAG). This incident underscores the importance of robust cybersecurity measures such as stolen credentials detection, darknet monitoring services, and digital footprint analysis.

Likely Disclosure Inconsistencies With Massive Snowflake Data Breach

‍After unearthing evidence as early as May 2024, cloud computing–company Snowflake released an official statement on June 2, reporting that they were investigating a series of targeted cyber events. A week later, Google's Mandiant, who, alongside Crowdstrike, is aiding Snowflake in this investigation, concluded that clients had been attacked after malicious actors had gotten access to compromised credentials.

TeamViewer Detects Compromise

On June 26, 2024, TeamViewer published a statement disclosing they detected an irregularity in TeamViewer’s internal corporate IT environment. TeamViewer is an organization that provides remote access software for devices and is extensively utilized by businesses and individuals globally. Upon detecting the incident on June 26th, TeamViewer immediately activated their response team and procedures and started investigations while implementing necessary remediation measures.

Understanding Transaction Monitoring in Anti-Money Laundering (AML)

Transaction monitoring in the realm of Anti-Money Laundering (AML) is a critical process that financial institutions employ to detect and prevent illicit activities such as money laundering, terrorist financing, and fraud. As regulatory scrutiny intensifies globally, the importance of robust transaction monitoring systems cannot be overstated.

AI Audit Logs: The Secret Weapon to Enhance Enterprise Security

In the rapidly evolving landscape of artificial intelligence (AI), ensuring robust security and compliance is becoming more difficult for enterprises. AI audit logs emerge as a critical tool in this mission, offering a detailed record of all activities within AI systems. By leveraging these logs, businesses can enhance their security posture, ensure regulatory compliance, and optimize AI usage. Let's delve into how AI audit logs can serve as a secret weapon in bolstering enterprise security.

New Critical GitLab Vulnerability Threatens Software Development Security

A critical vulnerability in GitLab, a widely-used Git repository platform, has been discovered, threatening the integrity of software development pipelines. GitLab has urged users running vulnerable versions to patch CVE-2024-5655 immediately to prevent potential CI/CD malfeasance. GitLab's Latest Security Patch GitLab, second only to GitHub in popularity, recently released updates for its Community (open source) and Enterprise Editions.

10 important questions to add to your security questionnaire

The technology your organization uses is integral to its success. When selecting vendors, security should be at the forefront of your decision. A strong vendor review process is crucial for selecting partners that align with your company's security goals, and security questionnaires are a key step in this process.