Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

regreSSHion: RCE Vulnerability in OpenSSH Server (CVE-2024-6387)

A high-severity remote code execution (RCE) vulnerability has been found in OpenSSH’s server (CVE-2024-6387) by the research team of Qualys. This issue is especially concerning because it brings back a problem that was originally fixed in 2006, showing that one of the most popular secure software still has hidden bugs. This discovery follows another major vulnerability found in the XZ Utils library just a few months ago, highlighting ongoing security challenges.

New Malware Campaign Impersonates AI Tools To Trick Users

Researchers at ESET warn that malvertising campaigns are impersonating AI tools to trick users into installing malware. The Rilide infostealer, for example, is being distributed via a malicious browser extension posing as Sora or Gemini. “In the case of the malicious browser extension, it is delivered to victims who have been duped into clicking on malicious ads, typically on Facebook, that promise the services of a generative AI model,” the researchers write.

Configuring Samba | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover JumpCloud Samba configurations and pair with Cloud LDAP. Enabling Samba support allows for LDAP users to authenticate to end points that require Samba attributes within the LDAP directory. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Recent Interview Reveals How Asklepios Kliniken GmbH Improves Risk Exposure with CyCognito

I recently sat down with Daniel Maier-Johnson, the Chief Information Security Officer (CISO), and Markus Diehm, Cybersecurity Analyst, with Asklepios Kliniken GmbH, Germany’s second-largest private healthcare provider, to hear about their experience using CyCognito to gain continuous monitoring, prioritize cyber risks, and safeguard patient information. Vital to any healthcare organization, is keeping patient data safe while complying with an ever-growing number of government regulations.

The Golden Age of Automated Pentesting for MSPs

The cyber threat landscape is constantly shifting, making it harder for MSPs to deliver top-notch security services while growing revenue. But thanks to advances in automation, MSPs now have the tools to offer scalable, efficient, and profitable cybersecurity services like never before—especially with penetration testing.

CrowdStrike's One-Click Hunting Simplifies Threat Hunting for Security Teams

Adversaries are not breaking in; they are logging in. The CrowdStrike 2024 Global Threat Report highlights an alarming trend: In 75% of cyberattacks detected in 2023, adversaries gained initial access through malware-free methods. This means they acquired valid credentials via techniques such as password spraying or phishing — or they simply purchased them off the dark web.

How Many Devices Do You Have? | Integration with ServiceNow CMDB

Is your network inventory spread across ServiceNow CMDB, spreadsheets, and various applications, leading to inaccuracies and causing you to overspend on service contracts? Discover how Forward Networks integrates with ServiceNow to seamlessly populate and update your CMDB with all organizational devices.

3 Ways to Realize Full Value from Microsoft Security Product Investments

As companies look to realize the full value of Microsoft Security products, they may find a managed security service provider can play a key role in helping them maximize the value of their investment. For many companies, the Microsoft 365 E5 license makes good business sense. In addition to the Office suite of productivity applications, E5 includes expanded capabilities for Microsoft cybersecurity solutions for endpoint detection and response (EDR), identity and access management (IAM), and more.

How to Conduct Comprehensive Security Audits Without Compromising on Time?

Ever wondered how to conduct security audits without wasting time? Security audits are crucial for protecting your business from threats. But they often feel like they take forever. The process can be overwhelming, especially if you’re trying to be thorough without sacrificing too much time. Luckily, it doesn’t have to be this way.