Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

What is PXE and why do devices need it?

Organizations in various sectors require multiple hardware assets. When organizations distribute assets to their employees, many have to deploy the boot files manually in individual devices, a tedious and time-consuming process—and especially when it’s necessary for 100 or more employees. ManageEngine DDI Central, a centralized platform for managing DNS, DHCP, and IPAM, provides you with templates so you can efficiently implement one-time configurations for your devices.

How to Stop Data Leaks in Their Tracks

Data leaks are a growing concern for organizations due to the rising volume of sensitive information stored digitally. Leaks occur when sensitive data is inadvertently exposed, and they can easily lead to cyber attacks, reputational damage, and enormous financial costs. The best way to protect against them is to stop them from occurring in the first place. In this blog, we’ll delve into the common causes of leaks and best practices to bolster data security and prevent data leaks effectively. ‍

CVE-2024-4879, CVE-2024-5178, CVE-2024-5217: ServiceNow MID Server Vulnerabilities Resulting in Unauthorized Code Execution

On July 10, 2024, ServiceNow disclosed a series of critical vulnerabilities impacting their platform, identified as CVE-2024-4879, CVE-2024-5178, and CVE-2024-5217. These vulnerabilities were responsibly disclosed to ServiceNow in May 2024 by Assetnote, a cybersecurity firm. ServiceNow responded by patching hosted instances in June 2024.

NEW! PHP 8.3 support, Online Licensing tools and 25% off at ioncube.com

Our latest ionCube Loader update supports the running of PHP 8.2 files (encoded with ionCube Encoder 13) on PHP 8.3 machines! ionCube Loaders are extra special in that we are sometimes able to offer extended compatibility allowing existing encoded files to run on future versions of PHP. With PHP 8.2 encoded files you are now able to run them on PHP 8.3 even if they were encoded before this new Loader version was released.

Safeguarding Your Collaboration Tools: Tackling the New Favorite Targets of Attackers

Secrets in collaboration tools are becoming prime targets for attackers. Reduce your attack surface by extending GitGuardian automated secrets detection capabilities to Slack, Jira, Confluence, or Microsoft Teams. Ensure security wherever your teams collaborate!

Analyzing ViperSoftX: The Use of CLR and AutoIt for Stealthy Malware Operations

The ViperSoftX info-stealing malware has evolved, now utilizing the common language runtime (CLR) to covertly execute PowerShell commands within AutoIt scripts. This sophisticated approach allows ViperSoftX to bypass traditional security measures and remain undetected, posing a significant threat to cybersecurity. Leveraging CLR and AutoIt for Stealth Operations CLR, a core component of Microsoft’s.NET Framework, functions as the execution engine for.NET applications.

Rapid Data Heist: Akira Ransomware Group's Two-Hour Attack on Veeam Servers

In a startling development, the Akira ransomware gang has demonstrated a dramatic reduction in the time it takes to exfiltrate data from compromised servers. According to the BlackBerry Threat Research and Intelligence Team, this cybercriminal group managed to steal data from a Veeam server in just over two hours during a June attack on a Latin American airline.

Savvy Security: Unpacking key SASE vendor selection criteria

Many companies are stepping up their security measures to protect against cyber risks associated with the increasing use of cloud services and remote work. As a result, the global deployment of Secure Access Service Edge (SASE) is on the rise. According to the 2024 Gartner CIO and Technology Executive Survey, 39% of respondents have already deployed SASE or plan to do so within the next 24 months.

Fortressing the Legal Frontier: Why SASE is Essential for Law Firms in the Age of Cyber Warfare

Guest blog by Jaye Tillson, Field CTO, Distinguished Technologist, HPE Aruba Networking The legal profession has long been a custodian for a significant of sensitive data. From mergers and acquisitions to intellectual property disputes, law firms hold the keys to a kingdom of confidential client information. However, in the digital age, this crown jewel has become a prime target for cybercriminals.

Why the World's Top MSSPs are Ditching Legacy SOAR for Hyperautomation

Managed Security Service Providers (MSSPs), desperate to automate repetitive tasks, initially turned to SOAR to reduce their workload and improve threat response times. Unfortunately, legacy SOAR tools still face scalability, flexibility, and integration challenges. As the complexity and volume of cyber threats continue to grow, the limitations of legacy SOAR have become more apparent, necessitating the move towards more advanced automation technologies like Torq Hyperautomation.