Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Featured Post

How Organisations Can Master Incident Reporting Obligations Under NIS2

The new NIS2 directive is designed to strengthen the cyber resilience of over 160,000 companies that operate in the EU - either directly or indirectly. Coming into force by 17th October, NIS2 regulations will outline how these essential entities can combat increasingly sophisticated and frequent cyber attacks.

How to use USB devices with a VMware vSphere virtual machine

The main function of a hypervisor is to emulate the devices used by virtual machines at the software level. Devices, such as virtual controllers, disks, DVD-ROMs, video cards, network cards, input devices, etc., are created in a virtual machine. But what if you want to connect a printer, scanner, USB flash drive, USB hard drive, USB smart card reader, security dongles, USB license keys, etc.?

Ethical Hacking vs. Vulnerability Assessment: Understanding the Differences

In the dynamic field of cybersecurity, two essential practices stand out: Ethical Hacking and Vulnerability Assessment. Both play critical roles in safeguarding digital assets, yet they serve different purposes and employ distinct methodologies. Understanding the differences, their place in cybersecurity, and when to deploy each tactic is crucial for maintaining a robust security posture.

Cybersecurity Sessions S03E01: "Bot's the Story, Morning Glory?" Oasis Ticket Scalper Bots

Netacea bot experts discuss the challenges around the Oasis reunion tour ticket sales, focusing on the issues caused by bots and scalping in high-demand events. The discussion explores the technical difficulties of managing ticket sales, the tactics used by bot operators to secure tickets, and the broader implications for the industry. The team also discuss why current methods to prevent bot activity often fail and why a multi-pronged strategy combining real-time detection, post-transaction analysis, and clamping down on secondary markets is critical.

Introduction to Amazon S3 Storage Classes

A good deal of my time and efforts in educating customers today is around object storage in general and AWS S3 in particular. In case you missed it 11:11 Systems has recently taken our partnership with AWS to the next level, making all of their S3 class storage available to you with our award winning support and flexible pricing options.

Revival Hijack: How Abandoned PyPI Package Names Are Being Exploited to Deliver Malware

Security researchers have uncovered a novel and concerning method for cybercriminals to distribute malware using public code repositories. Known as "Revival Hijack," this technique involves the re-registration of previously abandoned package names on the PyPI repository. By taking advantage of the fact that PyPI allows the reuse of names from removed packages, attackers are able to slip malicious code into unsuspecting organizations.

Cybercriminals Caught in the Trap: Infostealers Weaponized Against Hackers

In an ironic twist of fate, cybercriminals seeking to exploit stolen credentials have found themselves the targets of a new scheme. Security researchers recently uncovered a malicious campaign in which hackers were lured into downloading infostealer malware through a seemingly legitimate tool for checking compromised OnlyFans accounts. This development serves as a reminder that even those lurking on the dark web are not immune to digital risks.