Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Feature: Custom Damage Types

Custom Damage Types provide users with the ability to add specific types of damages that will be taken into consideration as part of the modeling process when quantifying financial exposure. This means, organizations now have a unified view of costs that consider company specific data alongside out of the box modeled costs. Users will need to provide a range of possible costs and create a scenario that triggers assigned costs.

Check the cyber insurance readiness of your organization

The rise in the frequency and intensity of cybercrime has seen many organizations turning to cyber insurance to help protect against the extent of financial losses following a cyberattack. While identifying and adopting a comprehensive cybersecurity strategy is crucial, even the most secure networks can still be exploited by adept hackers. According to reports, the global cyber insurance market is projected to grow from $11.9 billion in 2022 to $29.2 billion by 2027.

A Log4Shell (Log4j) Retrospective

As we approach the one-year anniversary of the Log4Shell vulnerability (CVE-2021-44228), Arctic Wolf Labs decided to look back on the impact that this critical vulnerability had (and continues to have) on organizations and assess the long tail of activity we’ve seen with threat actors continuing to use the exploit.

Discovered new BYOF technique to cryptomining with PRoot

The Sysdig Threat Research Team (TRT) recently discovered threat actors leveraging an open source tool called PRoot to expand the scope of their operations to multiple Linux distributions and simplify their necessary efforts. Typically, the scope of an attack is limited by the varying configurations of each Linux distribution. Enter PRoot, an open source tool that provides an attacker with a consistent operational environment across different Linux distributions, such as Ubuntu, Fedora, and Alpine.

Everything About Software Publisher Certificates

You sell software online, and a customer buys and uses it. Sounds simple, right? However, there is more to selling software. They need to trust that it has come from you and not some third party claiming to be you. Apart from that, they must also know that the software has not been tampered with since its creation. So how do you create that level of trust? Software Publisher Certificates is your answer.

European Regulator Fines Facebook Parent Meta $276 Million for Data-Scraping Breach

A leading European regulator fined Meta Platforms Inc., the company that owns Facebook, 265 million euros, or around $276 million, for failing to better protect the phone numbers and other personal information of more than half a billion users from so-called data scrapers.

Zeek on Windows

As we shared at ZeekWeek 2022 in October, we’re thrilled to announce emerging support for Zeek on Windows, thanks to an open-source contribution from Microsoft. Part of its integration of Zeek into its Defender for Endpoint security platform, this contribution provides fully-native build support for Windows platforms and opens up a range of future technical possibilities in this vast ecosystem.

How to verify and secure your Mastodon account

Mastodon, the free open source self-hosted federated social network platform, has been witnessing a surge of interest and new users due to the recent developments on Twitter — specifically that of verifying accounts. One of the interest areas driving users to Mastodon has been the ability to verify their account identity and convey a sense of authenticity for the account. This provides a way to help prevent spam accounts, bots, and other issues related to fake news.