Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Scams: Understanding vulnerabilities and protective strategies

Many people don’t realize that scams are complicated events orchestrated by scammers, which often include myriad persuasive techniques and take advantage of our individual characteristics and circumstances. While each scam varies in complexity, they typically progress through three broad stages, each influenced by factors that either heighten or diminish our vulnerability to becoming victims.

Find Your Best Fit: Solving the Cybersecurity Framework Puzzle

We recently presented the webcast "Find Your Best Fit, Solving the Cybersecurity Framework Puzzle." Tyler Reguly, who is a senior manager of research and development at Fortra and a former professor at his alma mater, Fanshawe College, served as the host. Tyler offered his wisdom about integrating CIS Controls into a comprehensive cybersecurity plan for your organization.

The Value of IR Planning and Incident Readiness

With cyber attacks increasing in frequency and damage, it’s more important than ever for organizations to understand that an incident of any scale is more of a “when” than an “if.” That means that, as part of a comprehensive security strategy, organizations should not only focus on keeping threats out but also ensure that if a threat turns into an incident, they’re prepared to swiftly respond and recover.

Understanding Cloud Misconfiguration: Risks, Prevention, and Solutions

Cloud configuration remains a critical priority for organizations leveraging cloud services, which today, is practically universal. Cloud misconfigurations, in turn, can lead to security vulnerabilities and compliance issues. That’s why it’s more important than ever for organizations to get this fundamental security function right. Here’s what you need to know about cloud misconfiguration, from what causes it to how to remediate it when it does occur. ‍

Insider Risk Management Strategies to Protect Sensitive Data

Cybersecurity methods are usually focused on protecting an organization from external risk factors, but insider attacks can be just as dangerous and costly as those that originate outside an organization. In fact, insider threats pose serious security risks because they typically involve individuals with authorized access to the organization’s systems, data, or networks.

CVE-2024-38428 Wget Vulnerability: All you need to know

On Sunday, June 2nd 2024, a fix commit was pushed for a vulnerability in GNU’s popular Wget tool. Two weeks later, the vulnerability was assigned the ID CVE-2024-38428 and later was classified as a critical vulnerability – with a CVSS score of 9.1. In this blog, we take a dive deep into this threat by seeing what caused it, what consequences it might have, and how it can be mitigated.

Advancing Threat Intelligence: JA4 fingerprints and inter-request signals

For many years, Cloudflare has used advanced fingerprinting techniques to help block online threats, in products like our DDoS engine, our WAF, and Bot Management. For the purposes of Bot Management, fingerprinting characteristic elements of client software help us quickly identify what kind of software is making an HTTP request. It’s an efficient and accurate way to differentiate a browser from a Python script, while preserving user privacy.

Enable Computer and User Accounts to be Trusted for Delegation

The policy setting ‘Enable computer and user accounts to be trusted for delegation’ for Administrators and No One allows users to change the Trusted for Delegation setting on a computer object in Active Directory. Abuse of this privilege could allow unauthorized users to impersonate other users on the network. The Windows security setting enable computer and user accounts to be trusted for delegation is a powerful security feature primarily used in enterprise environments.

Double Extortion Ransomware: What It Is and How To Avoid It

Double extortion ransomware is a type of cyber attack in which cybercriminals steal sensitive data and encrypt it. Then, cybercriminals threaten to release the stolen data unless the victim pays a ransom. The additional threat of exfiltration makes this type of cyber attack particularly damaging for organizations, as they face the risk of sensitive data being exposed to the public or sold on the dark web.