Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Are Businesses Taking Ransomware Seriously Essential Protection Tips for SMBs

Join Anand Prahlad, CEO & President of Parablu, and Venkatesh Sagare, Co-founder and CTO of Giniminds and Cloudigy, as they discuss the critical issue of ransomware attacks. They explore whether businesses, especially small and medium-sized ones, understand the real threat of ransomware. Venkatesh shares some compelling stats.

Exploring the Future of SOC Automation with Francis Odum

The future of SOC automation is dynamic and rapidly evolving, promising to revolutionize how security operations centers (SOCs) tackle their most pressing challenges. As cybersecurity threats grow in volume and sophistication, SOC teams are increasingly overwhelmed by alert fatigue, false positives, and a critical shortage of skilled professionals.

MOVEit Gateway and MOVEit Transfer Vulnerabilities

On June 25, 2024, Progress Software, the parent company of the MOVEit software suite, officially released details for two critical vulnerabilities identified in MOVEit Gateway and MOVEit Transfer, CVE-2024-5805 and CVE-2024-5806 respectively. MOVEit Transfer is a managed file transfer solution that supports the exchange of files and data between servers, systems and applications within and between organizations.

2024 Bitsight Ratings Algorithm Update: Purpose, Observations, and Impact

As our 2024 Rating Algorithm Update (RAU) goes live on July 10, 2024, we wanted to share some research that validates this update and reinforces the importance of the RAU process. As we noted in our announcement blog, after RAU 2024, remediated Patching Cadence findings will impact the Bitsight Rating for 90 days after the last vulnerable observation instead of 300 days.

The Real-World Threat of Cyberattacks on Water infrastructure

Do you remember the last time you didn’t have water? Reliable water delivery is something many of us take for granted. Our local water treatment plant sits at the edge of our neighborhood, and I pass it every day on my way to take the kids to school. Not a lot seems to go on there, so it never occurred to me that I should be concerned about an attack on this critical infrastructure. What does occur to me is the possibility of a cyberattack on our water system.

How to Set Up Real-Time Data Replication for VMware VMs with NAKIVO Backup & Replication

The Real-Time Data Replication for VMware functionality in NAKIVO Backup & Replication allows you to create real-time replicas of VMware VMs, continuously updated with source VM changes. Follow the steps in this video to learn how to deploy a target Transporter, install the I/O Filter and Journal Service, and create your first real-time replication for VMware vSphere with NAKIVO Backup & Replication.

Unfurling Hemlock: New threat group uses cluster bomb campaign to distribute malware

While reviewing common TTPs in malware campaigns used last year Outpost24’s Cyber Threat Intelligence team, KrakenLabs, came across several reports and articles describing a novel infection technique being used to distribute various types of malware not necessarily related to each other. For example, this article analyzing Amadey and this one talking about Redline.

CDK Global Cyber Incident Shows the Need for Better Supply Chain Security

CDK Global, a company that provides software for thousands of auto dealers, was hit by back-to-back cyberattacks on June 19. These attacks led to an outage that continued to impact many of their sales operations on Friday, according to the Associated Press. CDK told multiple news outlets that it is "actively investigating a cyber incident," and the company shut down all of its systems out of an abundance of caution.

Cloud Security Compliance: Ensuring Data Safety in the Cloud

Modern organizations know that protecting their data is absolutely critical. That’s where cloud security compliance comes in. Satisfying regulatory standards helps organizations protect against unauthorized access and data breaches, as well as other security incidents. Beyond protecting data, compliance also protects organizations from the legal implications and financial effects of attacks.

How to Prevent DDoS Attacks? [ 17 Best Practices]

In 2021, Amazon suffered a financial setback of around $34 million due to a one-hour system outage that led to a considerable loss in sales. Meta suffered a loss of nearly $100M because of Facebook’s 2021 outage. The consequences of downtime can be severe, and businesses of all sizes and governments can be affected. A DDoS attack can bring a business to a complete standstill for hours, leading to a substantial loss in revenue.