Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Discover your exposure to the XZ Utilities backdoor in 10 seconds or less

When high profile security events happen, it is essential for you and your team to have the information you require right at your fingertips. Using Panoptica’s powerful graph database and easy to use query engine, you are easily able to discover all the assets in all your cloud environments that could have compromised software installed.

PuTTY Vulnerability: CVE-2024-31497

On April 15th, Fabian Bäumer and Marcus Brinkmann of Ruhr University Bochum disclosed that PuTTY had a vulnerability that can allow an attacker to compromise private keys, then forge signatures, and log into any remote servers on which those keys are used. PuTTY is a free and open-source terminal emulator, serial console and network file transfer application that supports several network protocols, including SCP, SSH, Telnet, rlogin, serial port and raw socket connections.

Introducing UpGuard Trust Exchange

Security questionnaires represent the cornerstone of most third-party risk management (TPRM) programs. They allow organizations to responsibly appraise a vendor's security posture before they move forward with onboarding and grant the vendor access to internal systems and data. Nevertheless, most security teams feel burdened by time-consuming and lengthy security questionnaires, especially when faced with additional resource and staffing limitations.

DDoS report Q1 2024, certificate changes, QR phishing, and more

In this week's episode, we discuss different topics from blogs that we published in the previous couple of weeks, right after our Developer Week 2024. Host João Tomé is joined by our Field CTO, Trey Guinn, based in San Francisco. We discuss our most recent DDoS threat report for Q1 2024, highlighting the continued increase in DDoS attacks and emerging trends. Additionally, we address Cloudflare's efforts to ensure our customers aren't affected by Let's Encrypt's certificate chain change, emphasizing the importance of certificates.

How to Defend Against Modern Phishing Attacks

Phishing isn’t what it used to be. Older, popular scams — like grammatically incorrect love letters and mysterious princes who just need a little money — have given way to sophisticated and dangerous social engineering attacks. In fact, phishing has become so prevalent and effective that it is one of the three primary ways hackers compromise credentials.

Unlocking the Power of Offensive Security: Trustwave's Proactive Approach to Cyber Defense

Clients often conflate Offensive Security with penetration testing, yet they serve distinct purposes within cybersecurity. Offensive Security is a broad term encompassing strategies to protect against cyber threats, while penetration testing is a specific activity where security teams test system vulnerabilities. At its essence, Offensive Security isn't just about reacting to vulnerabilities; it's about actively hunting down and neutralizing potential threats before they wreak havoc.