Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Protect Your IoT and OT Devices from Cyberthreats

The rise of the Internet of Things (IoT) and Operational Technology (OT) devices is reshaping industries, accelerating innovation and driving new efficiencies. However, as organizations increasingly depend on these devices, the security challenges associated with them are mounting. Traditional security measures often fall short in protecting these critical assets from cyberthreats, leaving organizations vulnerable to potentially severe disruptions.

Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

The automotive industry is at a unique inflection point in its history with the advent of the Software Defined Vehicle (SDV). During the Society of Automotive Engineers (SAE) World Congress held in Detroit April 16th - 18th, 2024, it was explicitly stated there is more than a $500 billion market that will see investment in R&D and technological advancements for the automotive industry.

LLM Prompt Injection 101

Prompt injection attacks exploit vulnerabilities in natural language processing (NLP) models by manipulating the input to influence the model’s behavior. Common prompt injection attack patterns include: 1. Direct Command Injection: Crafting inputs that directly give the model a command, attempting to hijack the intended instruction. 2. Instruction Reversal: Adding instructions that tell the model to ignore or reverse previous commands. 3.

New IDC InfoBrief + downloadable CISO checklists

Tl;dr: This blog discusses IDC’s 2024 study, “The Future of Access Management: Identity Security Requirements for a Modern Application Access Approach.” The study identifies the biggest challenges facing security leaders today, especially those exacerbated by hybrid work. Below are IDC’s findings as well as downloadable checklists that security practitioners can use to address the security gaps in their organizations.

Sedara Named to MSSP Alert's 2024 List of Top 250 MSSPs

Sedara Named to MSSP Alert’s 2024 List of Top 250 MSSPs Eighth annual list reveals leading MSSP, MDR and MSP security companies The Top 250 MSSPs for 2024 honorees were announced on October 15 at MSSP Alert Live. The 2024 MSSP Top 250 list reveal marks the first time the list has been unveiled at MSSP Alert’s annual live event. Honorees will also be celebrated at an evening party that coincides with MSSP Alert Live. Sedara was ranked among the Top 250 MSSPs for 2024.

What Is DFIR? Digital Forensics & Incident Response

We all know how often attackers gain access to online devices to compromise security. That’s why digital defense is as important as physical defense. However, ensuring digital safety can be more challenging than physical safety. To overcome this problem, authorities combine digital forensics with incident response. But what does this mean?

The Forensic Investigator Role: Skills and Responsibilities

Businesses adopt new and sophisticated technology every day. All that tech, however, comes with the risk of crime or financial fraud. That’s what forensic investigators help with — they solve these crimes by identifying the criminals and recovering the assets. Forensic investigators collect evidence from crime scenes, analyze it, and conclude the results in a report that later serves as an important document in trials.

Ransomware Gang Attack Tactics Have Shifted

A recent analysis of the ransomware group Meow raises the notion that groups are evolving from using encryption as a tactic to more profitable and cost-effective methods. At the end of the day, ransomware is a business. Those behind the malware used in ransomware attacks typically seek to make money, whether that be directly from the victim organization or by way of a nation-state paying for the gang’s services.

New Research: 140% Increase in Callback Phishing

Researchers at Trustwave observed a 140% increase in callback phishing attacks between July and September 2024. Callback phishing is a social engineering tactic that involves emails and phone calls to trick users into handing over login credentials or other sensitive data or installing malware. The attacks begin with a phishing email that appears to be a notification for something that needs to be addressed urgently, such as an order invoice or an account termination notice.