Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

How Automation and AI are Transforming GRC Management

There is no doubt that we now live in an AI-driven, automation-powered world. Across industries and markets, leaders and professionals are achieving the utility of AI in their processes. The same applies to Governance, Risk, and Compliance (GRC) management, but when one looks at the actual implementation, the data shows that there's still a long way to go. According to one recent report, only 21% of GRC leaders use AI to perform GRC activities.

Life in Cybersecurity: Expert Tips and Insights from a Cybersecurity Recruiter

One of the most challenging aspects of working in cybersecurity can be the deceptively simple act of finding the best job that suits your skillset and best fits the employer's expectations. Whether it is an entry-level position, a lateral move, or a career advancement, there is more to finding a rewarding position than just relying on the heavily publicized skills shortage.

CVE-2024-40766: Critical Improper Access Control Vulnerability Impacting SonicOS

On August 22, 2024, SonicWall published a security advisory regarding a critical improper access control vulnerability in several SonicWall Firewall models. This vulnerability, identified as CVE-2024-40766, is a flaw in SonicOS, the operating system that powers these firewalls. CVE-2024-40766 allows a remote, unauthenticated attacker to gain unauthorized access to resources and/or cause the firewall to crash under specific conditions.

Ace Your Back-to-School Season with Threat Intelligence

As the school year officially kicks off, students everywhere are hitting the books. But it’s also time for IT and security teams as well as administrators to get up to speed on the latest cyber threats that may impact their environment. The education sector is a treasure trove of valuable data – from financial and sensitive personal information to intellectual property and raw research data – which makes it an attractive target for threat actors.

EP 60 - Going Viral: Security Insights from TikTok's Former Global CSO

In this episode of the Trust Issues podcast, Roland Cloutier, who served as TikTok’s Global Chief Security Officer (CSO) from April 2020 to September 2022, joins host David Puner for a discussion that covers his extensive experience in the field of security. He previously held similar roles at ADP and EMC and is now a partner at the Business Protection Group.

7777 Botnet - Insights into a Multi-Target Botnet

Over the last month there have been some updates about the mysterious 7777 botnet—which was first mentioned in this post in October 2023. Until now, it was known that the botnet was made up of TP-LINK routers and that it was being used to execute very low volume and controlled brute force attacks on Microsoft 365 services targeting corporate accounts. In our continuous efforts to have all sorts of malware families under our radar, the 7777 botnet is no exception.

The Problem with Disjointed Cloud Migration Journeys

Organizations start their cloud migration journey with high hopes for more speed, agility, and innovation. But often, these hopes fall short. Instead of achieving a seamless, cloud-powered enterprise, companies end up with fragmented cloud projects, data security risks, and unpredictable spending. This scattered approach can stall cloud initiatives and prevent organizations from fully benefiting from the cloud. Let’s take a look at some of the impacts and risks.

Phishing in Style: Microsoft Sway Abused to Deliver Quishing Attacks

In July 2024, Netskope Threat Labs tracked a 2,000-fold increase in traffic to phishing pages delivered through Microsoft Sway. The majority of the credential grabbing pages investigated used “Quishing,” a form of phishing that uses QR code to trick users into accessing a malicious website. The phishing campaigns targeted MS Office credentials, using documents to bait users into logging in.

Applying a 'Three-Box Solution' to Identity Security Strategies

Physical and network barriers that once separated corporate environments from the outside world no longer exist. In this new technological age defined by hybrid, multi-cloud and SaaS, identities are the perimeter. Any one identity—workforce, IT, developer or machine—can become an attack path to an organization’s most valuable assets.