Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them.

Layer 7 DDoS Attack Methods

A10 Networks' security experts Jamison Utter and Carlo Alpuerto delve into comprehensive DDoS protection. In this segment, Carlo Alpuerto explains how attackers exploit Layer 7 DDoS methods, such as slow POST attacks and other slow-rate techniques (potentially referring to "slow patches" or similar application-layer attacks), to disrupt services. Whether you're a security professional, network administrator, or business leader concerned about cyber resilience, this expert conversation provides actionable insights to strengthen your organization's DDoS protection posture.
Featured Post

Why Codefinger represents a new stage in the evolution of ransomware

Forget typical ransomware! Codefinger hijacked cloud keys directly, exposing backup flaws and shared responsibility risks. Time to rethink defence. If you didn't pay much attention to news of the recent Codefinger ransomware attack, it's possibly because ransomware has become so prevalent that major incidents no longer feel notable. But Codefinger is not just another ransomware breach to add to the list of incidents where businesses lost sensitive data to attackers. In key respects, Codefinger represents a substantially new type of ransomware attack.

How To Reduce Your Attack Surface with Secure Password Management

With the rise of remote work, cloud computing and mobile devices, your organization’s attack surface is larger than ever. Watch this short video to learn what an attack surface is, how to identify security vulnerabilities and five ways to minimize your attack surface.

The Change Healthcare hack wasn't just a breach-it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal healthcare coverage, administrative inefficiencies, and an under-resourced primary care system, it's so bad that falling ill could very well bankrupt a citizen.

Layer 7 DDoS Attacks: How Hackers Target the Application Layer

Layer 7 DDoS attacks—also known as application-layer attacks—target the part of your application that users interact with, like login pages, search boxes, and APIs. Unlike traditional volumetric DDoS attacks, these are stealthy, harder to detect, and can take down your app using fewer requests.

What is NoSQL Injection? | Examples & How to Prevent It

NoSQL Injection is a serious web security flaw that targets NoSQL databases like MongoDB. In this video, you’ll learn: What NoSQL injection is How attackers exploit unsanitized inputs Real-world NoSQL injection examples Best practices to prevent these attacks Secure your applications with proper input validation and safe query building techniques.

Effective Deception for Zero Day Attacks: Strategies for Cyber Defense

Deception for Zero day attacks has become a crucial strategy as these devastating exploits continue to surge rapidly. These attacks pose extreme danger because they target vulnerabilities unknown to software vendors or the public, which leaves systems defenseless without immediate patches. Attackers can exploit these vulnerabilities undetected for extended periods – from days to years. This creates a huge window for attacks before vendors can patch the problems.

One SQL Injection Could Bring Down Your App. Here's How to Prevent It

SQL Injection represents the most common web application vulnerability, and justifiably so: it is the most dangerous. Attackers can inject SQL code into victims' sites and access databases, potentially allowing unauthorized access and data compromise or, worst case, full-blown compromise of the site. Shielding one's website against SQL injections would mean having to understand how SQL injections work and implement preventive measures against them.