Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CVE-2024-27348 - A Critical RCE Vulnerability in Apache HugeGraph Server

Apache HugeGraph-Server, a popular open-source graph database tool, has been found to have a critical security vulnerability tracked as CVE-2024-27348. The vulnerability allows remote code execution (RCE), giving attackers the ability to execute arbitrary commands on vulnerable servers. This blog explores the details of this vulnerability, its impact, and the necessary mitigation steps to protect affected systems.

A Practical Guide for Implementing and Managing Remote Access Solutions

Not long ago, remote access was reserved for a select few, such as traveling salespeople and senior executives. Today, it has become ubiquitous. Indeed, users across many roles and functions in the modern office now routinely connect to the corporate network from off-site locations and work with resources as if they were connected to the local network. However, allowing users to access corporate resources remotely introduces security risks, so robust management is vital.

10 Security Risks of Poor Access Management and How to Mitigate Them

Secure access management is more than just strong password policies and multi-factor authentication (MFA) – it includes a variety of processes and tools that create an integrated and comprehensive approach to safeguarding digital assets. To manage access effectively, organizations must implement strategies like continuous monitoring, adaptive access controls, and automated workflows for user provisioning and deprovisioning.

What are the Current Trends in Cloud Technology?

In recent years, cloud technology has become integral to business operations. Compared to on-premises infrastructure, it allows for improved scalability and flexibility, cost savings, collaboration, security, and data loss prevention. The cloud computing market is set to reach $679 billion in value in 2024. But what are the trends currently defining the cloud computing market?

eBPF use cases

What is eBPF and how can it be used within the Kubernetes environment? In the dynamic world of container orchestration, where speed and adaptability are a must, eBPF, short for Extended Berkeley Packet Filter, has changed how developers interact with kernels within Kubernetes environments. At its core, eBPF crosses traditional boundaries, offering a programmable and secure in-kernel execution environment that empowers developers to use custom code without the need for modifications to the kernel itself.

How State and Local Governments Can Stay Safe From Cyber Attacks

Cyber threats are increasing and, unfortunately, local and state government entities have become top targets. In 2023, the FBI reported that government entities were the third most-targeted sector by ransomware, and Arctic Wolf’s own research saw the average ransom for government organizations top $1 million USD. And that’s just one kind of cyber attack.