Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 35 - Threat Innovations: Exploring Cascading Supply Chain Attacks

In this episode, we welcome back Shay Nahari, VP of CyberArk Red Team Services. His discussion with host David Puner revolves around attacker innovation, focusing on key areas like cascading supply chain attacks and session cookie hijacking. Lean in as Nahari explains how the Red Team simulates real-world attacks to help organizations identify vulnerabilities and improve their security posture.

Are You Cyber Recovery Ready?

True cyber resilience involves much more than having a disaster recovery (DR) solution. That’s because recovery from a typical DR scenario is different than recovery from a cyber event. Why? For starters, disaster recovery scenarios usually involve human nature, mother nature, or technical failure: These are just a few examples.

Detecting Gozi Banking Malware

As a principal security researcher on Corelight’s Labs team, I help to solve difficult network security research problems at scale. Corelight’s customers might recognize some of my work if you see the packages “VPN Insights” or “App ID” on your sensors. Outside of my day-to-day role, I have a hobby podcast called eCrimeBytes where we lightheartedly discuss an electronic crime case each week.

New Container Exploit: Rooting Non-Root Containers with CVE-2023-2640 and CVE-2023-32629, aka GameOver(lay)

Two new local privilege escalation vulnerabilities were recently discovered in Ubuntu: CVE-2023-2640 (CVSS 7.8) and CVE-2023-32629 (CVSS 7.8). The vulnerabilities, dubbed GameOver(lay), affect the OverlayFS module in multiple Ubuntu kernels. Ubuntu’s official security bulletin here and here outlines the impacted versions by both CVEs. It’s important to note that CrowdStrike Falcon® Cloud Security protects against both vulnerabilities.

Cognizant Customers and Select Medicaid and Medicare Patients Exposed in Recent Breach

Cognizant is a massive IT services company with over 300,000 employees and more than $15 Billion in annual revenue. The company helps major corporations with IT services. TMG Health is a healthcare services provider that works with Medicare Advantage, Medicaid Part D, and Managed Medicaid programs for many government agencies throughout the country. Between these two major companies, a huge amount of data is stored. All that data is now vulnerable because of a breach that started in May.

What Is IoT Security?

Internet of Things (IoT) security protects IoT devices and the networks to which they connect from cyberattacks. IoT devices can include anything that connects to your internet including doorbell cameras, baby monitors, smart bulbs and thermostats. This presents a cybersecurity risk because anything that can connect to your internet is at risk of being hacked.

Data Loss Prevention (DLP): Definition, Components & Types

The importance of data security cannot be overstated. Data Loss Prevention (DLP) has emerged as a crucial component in safeguarding sensitive information and ensuring compliance with ever-evolving regulations. In this blog post, we'll share everything to know about DLP, exploring its definition, key components, types of solutions, importance, best practices, tools, and common challenges.

The MSSP Buyer Guide to Threat Intelligence and EASM Services

We’re all familiar with software as a service or platform as a service, but what about Cyber-Crime-As-A-Service? It’s not just the sheer quantity of cyber threats that is increasing at alarming rates, it’s the methods and ease at which cybercriminals are finding to deploy attacks.,

Why Legal Regulation Shifts Responsibility for Software Supply Chain Security to Vendors

In the face of increasingly impactful malicious attacks, governments of leading economies have turned their attention to the software supply chain security. Regulations like the EU’s Digital Operational Resilience Act (DORA) for financial institutions and the Cyber Resilience Act (CRA) for software and hardware providers Australia’s 2023-2030 cybersecurity strategy, and the U.S.