Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

DAST Vs. Penetration Testing: Comprehensive Guide to Application Security Testing

For two decades or so now, web applications have been the backbone of many businesses, making their security paramount. Dynamic Application Security Testing (DAST) and penetration testing are crucial for identifying and mitigating security vulnerabilities in web application security. While both aim to enhance application security, they differ significantly in their approach, execution, and outcomes.

10 Botnet Detection and Removal Best Practices

If your device suddenly behaves like a re-animated zombie, it might be under a botnet attack. Botnet attacks, also known as zombie armies, involve hijacking internet-connected devices infected with malware, controlled remotely by a single hacker. These attacks can reach immense scales, as demonstrated by an incident where 1.5 million connected cameras were exploited to overwhelm and take down a journalist’s website.

Chinese APT Groups Use Ransomware for Espionage and Diversion

Cyberespionage groups are increasingly using ransomware not just for financial gain but also as a tactic to complicate attack attribution, distract defenders, or serve as a secondary objective to data theft. A recent report highlights the activities of ChamelGang, a suspected Chinese advanced persistent threat (APT) group, which uses the CatB ransomware strain to target high-profile organizations globally.

Jira Project Recovery Guide: How To Restore Deleted Jira Project

If you lose a Jira project it can seem like a terrifying experience, but there are ways to restore those deleted projects. Whether it’s an unintentional or purposeful deletion that has to be reversed, if you understand Jira’s restore functionality and the value of backup solutions, it may save a lot of your time, money, and work.

Red Team Vs. Blue Team: A deep dive into Cybersecurity roles

Organisations employ various strategies to protect their digital assets and infrastructure. Two key components of a robust cybersecurity framework are Red Teams and Blue Teams. These specialised groups play distinct yet complementary roles in ensuring an organisation’s security posture remains strong in the face of constantly emerging threats.

New MOVEit Bug Actively Exploited Within Hours of Public Disclosure

A high-severity security flaw in Progress Software's MOVEit Transfer platform is being exploited in the wild just hours after its disclosure. This vulnerability, identified as CVE-2024-5806, allows attackers to bypass authentication mechanisms and pose as any valid user, thereby gaining access to sensitive files.

Inventory - What is it? How can you use it as evidence?

An inventory is a specific list of data that is gathered to provide information about a certain part of the business. The inventory is inspected by an automated test or by a human to determine if one or more controls are satisfied and to analyze the results of the inventory. Examples of inventories are users, security incidents, devices, servers, databases, logs, etc.

Episode 5: Exploring PAM360's certificate lifecycle management (CLM) capabilities

In the fifth episode of the PAM Masterclass training series, we will learn how to manage the entire lifecycle of certificates within ManageEngine PAM360. We will cover topics such as certificate deployment, renewal, and expiration, providing practical strategies for maintaining a certificate-secure IT infrastructure. By the end of the session, you will gain knowledge about the process needed to effectively optimize your certificate management processes using PAM360's native certificate life cycle management module.