Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A Look at Container Security Through the Lens of DevOps

Containerization has revolutionized application development, deployment, and management – and for good reason. The ability to automatically wrap an application and its dependencies into a single, easily deployable package helps developers focus on what they do best: writing code.

Configuring Samba | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover JumpCloud Samba configurations and pair with Cloud LDAP. Enabling Samba support allows for LDAP users to authenticate to end points that require Samba attributes within the LDAP directory. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Analyzing ShinyHunters' Cybercrime Activity in the Truist Bank, Twilio Authy, and Neiman Marcus Breaches

In the rapidly evolving landscape of cyber threats, few groups have made as significant an impact as ShinyHunters. Emerging in 2020, this international cyber threat group has been responsible for several high-profile data breaches, causing substantial disruptions across various sectors. The Foresiet Threat Intelligence Team has been closely monitoring ShinyHunters' activities to understand their methods, targets, and the broader implications of their actions. How Does ShinyHunters Hack?

Regulatory Compliance and Ransomware Preparedness

Ransomware attacks are a huge problem: in the past five years alone, they have brought about a state of emergency across vast swathes of the United States, threatened to topple the Costa Rican government, and brought Portugal's largest media conglomerate to its knees. And ransomware attackers show no signs of slowing down: last year, roughly one-third of all data breaches involved ransomware or some other extortion technique.

The Veracode CLI: End to End Testing with Static, Container, and Dynamic Scanning

In this blog, we’re going to examine the Veracode CLI tool. Available for Windows, MacOS, and Linux, the imaginatively named binary veracode can perform a variety of functions across the SDLC. Installing the tool is easy, just follow the steps in the documentation.

The Curious Case of the Payroll Pilfering

In a world where cyber espionage has become as common as a rainy day in London, the recent events surrounding the UK armed forces' payroll database have had us all raising our eyebrows higher than a butler's in a posh British drama. The plot twists in the world of cybersecurity often reminds me of a Bond film, albeit with fewer martinis and more malware.

Tracing Linux: A file integrity monitoring use case

Protecting mission-critical Linux machines is essential for any business. Sophisticated cyber attacks can start from a low-value target machine and pivot into high-value servers filled with sensitive information. However, many organizations face challenges when their infrastructure includes older Linux kernels that do not support modern tracing technologies.

June Release Rollup: Egnyte for Microsoft (MS) Teams - Drag and Drop Functionality, Enhancements to Document Room Portal and More

This month's product updates and enhancements rollup includes Egnyte for MS Teams - Drag and Drop functionality, enhancements to the Document Room Portal, and user management on the Android mobile app. Please visit the articles linked below for more details.

Ticketmaster Incident: How to protect your company's Cloud

Cloud systems were created to maintain information on a comprehensive, accessible, and flexible platform. Although this system is still preferred by many companies, especially multinationals, to facilitate access to information between different teams within organizations, irresponsible use of the Cloud can create serious problems for corporate cybersecurity. Ticketmaster is a recent case in point.