Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Certera EV Code Signing Certificate for Highest Software Legitimacy and Integrity

Certera is the modern and affordable certificate authority offering code signing and SSL certificates. It is sub CA is globally trusted CA named Sectigo. Digital certificates called EV (Extended Validation) code signing certificates are used to encrypt and sign code, scripts, and software programs. Users may have a high level of confidence thanks to these certificates that the code being signed is genuine, hasn’t been tampered with, and originates from a reliable source.

Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks

Since 2020, CrowdStrike has increasingly observed big game hunting (BGH) threat actors deploying Linux versions of ransomware tools specifically designed to affect VMWare’s ESXi vSphere hypervisor (read Part 1 and Part 2 of this series).

How to Complete Your LogScale Observability Strategy with Grafana

CrowdStrike Falcon® LogScale provides a full range of dashboarding and live query capabilities out of the box. Sometimes, however, you’ll work in an environment where there are other solutions alongside LogScale. For example, let’s say your operations team takes an observability approach that includes metrics scraped by Prometheus, tracing with Tempo and dashboard visualizations with Grafana.

Understanding the ISO 27000 Series Changes

David Bowie once sang, “ch-ch-ch-changes, turn and face the strange.” While the changes to ISO 27000-series may look strange, they’re primarily a configuration and modernization of the same standard you already know. The standard’s format looks entirely different, but most of your current controls will remain the same.

Capability deep dive: Data search

Data search, ID 3010 in the Automation Capability Matrix, is crucial for organizations to swiftly locate and analyze pertinent information. This makes it an essential tool for cybersecurity, IT operations, and compliance teams. Data search involves querying, filtering, and retrieving data from various sources such as SIEM platforms, databases, and other data storage solutions. This process allows organizations to discover valuable insights, identify anomalies, and make data-driven decisions.

DevSecOps lifecycle coverage with new Snyk and Dynatrace app

Balancing the volume of applications and the increased deployment frequency with the need for security is a struggle for both development and security teams. Recent research indicates that vulnerability management in modern software development has become more complex, with 69% of CISOs acknowledging this challenge. Consequently, many applications are not adequately covered by security scans.

The Pros and Cons of a VPN

The primary benefit of a Virtual Private Network (VPN) is that it keeps your information and identity private when using the internet to access sites or servers, download files and more. This is especially important when handling sensitive information on public networks, like checking your bank account at the airport or accessing work files remotely. There are a number of use cases, from personal device security to maintaining safe business networks, which we will cover in this article.

The Face Off: AI Deepfakes and the Threat to the 2024 Election

The Associated Press warned this week that AI experts have raised concerns about the potential impact of deepfake technology on the upcoming 2024 election. Deepfakes are highly convincing digital disinformation, easily taken for the real thing and forwarded to friends and family as misinformation. Researchers fear that these advanced AI-generated videos could be used to spread false information, sway public opinion, and disrupt democratic processes.

How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry

In this post, we’re going to learn how Foundry can be used to write a proof of concept (PoC) for uninitialized smart contract vulnerabilities. We will take a look at and exploit a simple uninitialized smart contract vulnerability we found in BadgerDAO. If you are familiar with this type of vulnerability, jump straight to the Foundry PoC section. You can also find the PoC code on this GitHub repository.

How Cybersecurity Affects the Insurance Industry

Insurance companies are among the businesses more reliant than ever on technology and information systems for daily processes. Insurance technology, or insurtech, improves the efficiency of the insurance industry but can also increase attack surfaces, making the data insurers collect more vulnerable to theft.