Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

GDPR and CPRA: A Unified Call for Data Transparency and Accountability

The General Data Protection Regulation (GDPR) of the European Union and the California Privacy Rights Act (CPRA) represent landmark regulations designed to protect consumer data privacy. While GDPR became enforceable in May 2018, CPRA came into effect in January 2023, building on its predecessor, the California Consumer Privacy Act (CCPA). Both laws aim to empower individuals with greater control over their personal data while imposing rigorous obligations on businesses.

Command injection in 2024 unpacked

Command injection is a vulnerability still very prevalent in web applications despite being less famous than its cousins SQL injection or Code injection. If you’re familiar with other injection vulnerabilities, you’ll recognize the common principle: untrusted user input is not properly validated, leading to the execution of arbitrary system commands. This flaw occurs when unvalidated input is passed to system-level functions. So how prominent is command injection actually?

CrowdStrike Partners with MITRE Center for Threat-Informed Defense to Launch Secure AI Project

As organizations deploy more AI-enabled systems across their networks, adversaries are taking note and using sophisticated new tactics, techniques and procedures (TTPs) against them. The need for continued innovation to fight these threats is paramount.

NotLockBit Ransomware, Embargo Ransomware, Emennet Pasargad, and More: Hacker's Playbook Threat Coverage Round-up: November 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we highlight attack coverage for several new threats. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats. Additional details about the threats and our coverage can be seen below.

Understanding the Risks and Mitigation of Phishing Attacks in 2024

Even though cybersecurity is always changing, phishing attacks are still a threat that is getting worse. The goal of these attacks is to get people to give up private data like passwords, financial information, or company secrets by using social engineering tricks. As technology has improved, phishing schemes have grown more complex in 2024. They now use convincing methods to target both people and businesses. According to new studies, 91% of cyberattacks start with a phishing email.

Vulnerability Management as a Service: What Businesses Need to Know

Cyber threats are at an all-time high because the digital world is rapidly changing so quickly. Every day, new vulnerabilities are found in security systems. Attacks threaten businesses of all sizes by stealing data, disrupting operations, and damaging reputations. It has become clear that Vulnerability Management as a Service (VMaaS) is the best way for companies to protect their digital assets without having to manage security systems themselves.

Integrating SASE and NDR: Building a Robust Security Framework

Secure Access Service Edge (SASE) is a holistic security model that integrates both networking and security functions into a single, cloud-native architecture. SASE security combines secure network access, SASE cloud security and zero-trust technologies to create a unified approach to protecting the enterprise networks of today. SASE can be extremely useful especially for organizations adopting digital transformation and remote work. Some of the SASE benefits are.

Threat Group Use AI Adult-Based "Deepnude" Image Generator Honeypots to Infect Victims

The threat group FIN7 is using the lure of generating nude images of favorite celebrities to get victims to download their NetSupport RAT. In any social engineering scam, there’s always the need to create some sense of urgency to act in order to make the potential victim take an action that enables the attack. In the case of a new attack by threat group FIN7, the urgency appears to be the desire to see deepfake nude images.