Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Developer Roll Up: March 2023

Spring is in the air and the team at LimaCharlie continues on its quest to change the way that cybersecurity tools and supporting infrastructure are delivered. Join us for this month’s live webinar where Matt Bromiley, our Lead Solutions engineer, will be discussing LimaCharlie's detection and response capabilities. In this live webinar, we will look at: This is part two of a multi-part education series (part 1 here), where we look at different ways to utilize the LimaCharlie platform.

The Snyk Perpetual Key Rotation Machine

At Snyk, we think of developers as citizens of a special community. In that community, your collection of apps is your neighborhood — and your code is your home base; your house. How do you secure a house? With a lock! And how do you make sure no one else can unlock that lock? You keep the key! That’s security ideation at its finest: keys. Just ask Vinz Clortho, Keymaster of Gozer.

Discovering the Gems of AboutInfoSec: A Cybersecurity Expert's Perspective

Are you a cybersecurity enthusiast or a professional looking for the latest news, insights, and updates on the ever-evolving world of digital security? If so, AboutInfoSec might just be the website you've been looking for. As a cybersecurity expert with over seven years of experience, I've come across my fair share of online resources, but few have impressed me as much as AboutInfoSec. In this article, I'll share some of the most useful and interesting things I've found on this website.

Command and Control: Understanding & Defending Against C2 Attacks

Attackers go through several stages to make an attack successful. And the last line in the defense system they aim to break is the command and control (C2). C2 attacks are a severe threat to organizations of all sizes and types because, if successful, adversaries can steal all your valuable data. To protect against these attacks, you should implement a security framework and robust policies, including technical and organizational measures.

A Complete Guide to Cybersecurity Compliance

Cybersecurity has become a top priority for organizations across all industries and sizes. To safeguard their sensitive data and assets from the ever-evolving threats of cyberattacks and data breaches, businesses must take a proactive approach. Adherence to industry-specific cybersecurity regulations and frameworks is a critical component in building a robust and comprehensive cybersecurity program.

Trustwave Action Response: Supply Chain Attack Using 3CX PABX Software

On March 29, a massive supply chain compromise in 3CX software resulted in malware being installed globally across multiple industries. It is similar to the other high-profile supply chain attacks (like SolarWinds and Kaseya) in that rather than targeting a single organization, the criminals target a popular service or software provided to many large organizations. With one single compromise of the supplier, dozens and potentially hundreds of organizations may fall in turn.

The Power of Continuous Penetration Testing

As organisations continue to become more reliant on technology, cyber security threats become more frequent and sophisticated. With more and more data being stored online, it’s crucial that organisations protect their systems and data from cyber attacks. Penetration testing is an effective way to identify vulnerabilities and weaknesses in an organisation’s cyber security defences, but traditional penetration testing has limitations.

Ultimate Security Checklist to Launch a Mobile App in Mexico - iOS & Android

Mexico is a budding market for mobile apps. The total revenue generated by mobile apps is expected to surpass $2100 million by 2027 from just $1500 million in 2022. So, if you're an app developer and thinking of launching a secure mobile app in Mexico, you're making the right decision. However, it's not as easy as you may think. Navigating Mexican data privacy regulations can be challenging, but it's critical to ensure that personal information stays secure and is not misused.

What Is the Dark Web and Is It Dangerous?

The internet has become as essential as water for each one of us. It has transformed our lives in more ways than one. People from all walks of life depend on the internet to access information, communicate, and conduct commerce. However, every technology has its pros and cons. The internet, too, has a darker side, which comes to the fore on the dark web. The dark web is the hidden segment of the internet and it is accessible by means of specialized software.

How To Prevent Overprivileged Data Access From Harming Your Business

Privileged access management was designed to prevent human errors and reinforce security in general. However, even though this approach has been used for decades, studies still show that human error contributes to 95% of cyber attacks. So what are organizations doing wrong? Are they using privileged data access in the best way possible? Sadly, many companies don’t put much thought into using their security systems correctly, but there is an easy way to fix this.