Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Tech Talk: Behind the curtain - Obfuscating Linux Symbols

This is a Bulletproof Tech Talk article: original research from our red team covering issues, news, and tech that interests them. It’s more technical and in-depth that our usual blog content, but no less interesting. This blog looks at obfuscating Linux Symbols using dl_iterate_phdr with callbacks. It represents original security research from the Bulletproof Red Team.

Polyfill Supply Chain Attack Hits 100K Websites

Over 100,000 websites fell victim to a recent web supply chain attack through the Polyfill JavaScript library. This incident underscores significant vulnerabilities in third-party script integration across the web. This article covers what Polyfill does, why it’s now a threat, and the steps you should take if your website relies on it.

Monitoring and Auditing LLM Interactions for Security Breaches

Monitoring and auditing are critical components of cybersecurity, designed to detect and prevent malicious activities. Monitoring involves real-time observation of system activities, while auditing entails a systematic review of logs and interactions. Large Language Models (LLMs), such as GPT-4, are increasingly integrated into various applications, making them attractive targets for cyber threats.

Weekly Cyber Security News 11/07/2024

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! A couple of real nasty Open Source issues in the past week. The first and most recent is Ghostscript. Could well be a lot of SaaS products affected.

Threat Intelligence for Small Organizations

Many smaller organizations aren’t sure where to start with threat intelligence; it may seem like the kind of maturity reserved for large organizations. Threat intelligence is a proactive cybersecurity strategy focused on collecting information about current threats, analyzing it, and using that information to identify and mitigate threats within the network. It’s approachable even for smaller organizations that don’t have the resources for novel research and analysis.