Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Five Questions Your EASM Vendor Doesn't Want You to Ask

With EASM now a critical piece of security operations, it seems like every vendor is jumping into the EASM pool. But not all EASM products are created equal. Companies in adjacent markets, like threat intelligence, are creating attack surface scanning products that are well short of enterprise grade. The shortcomings of these basic EASM products can waste time, erode confidence in security teams, and give an inaccurate picture of organizational risk.

Justifying Compliance Tools Before a Breach Occurs

Breaches, be they accidental, careless, or malicious, are an inevitability for most companies. Depending on the industry, the consequences could range from something as minor as a little public embarrassment to hefty fines, lawsuits, expensive remediation actions, and loss of customer confidence (and, with that - business). The question is, how can compliance use this to its advantage and get a share of the security budget before something happens?

How to Delete Files in PowerShell with Remove-Item

Managing files and directories is a common task in computing, especially in the Windows PowerShell environment. The Remove-Item in PowerShell is a key cmdlet for deleting files and directories, as well as other types of items in PowerShell. Remove-Item can be used for local file systems as well as other PowerShell providers like the Registry, Certificate Store, and Environment variables.

What Bletchley Park Can Teach Us About Building a Strong Security Culture

During World War II, a group of brilliant minds led by Alan Turing gathered at Bletchley Park in England to crack the German Enigma code. This wasn't just a technological challenge, it was a race against time that required diverse skills, innovative thinking, and collaboration. The success at Bletchley Park didn't come from a single genius or a magic machine, but from a collective effort that brought together linguists, mathematicians, chess players, and even crossword enthusiasts.

How To Prevent Man-in-the-Middle Attacks

You can prevent Man-in-the-Middle (MITM) attacks in your organization by investing in a password manager, using a VPN, monitoring your network and training employees on security best practices. MITM attacks occur when a cybercriminal intercepts private data sent between two businesses or individuals to steal or alter the data with malicious intent.

How To Spot Fake Ads on Facebook

You can spot fake ads on Facebook if you notice that the ads feature very inexpensive products, poor-quality images, spelling mistakes or a lack of clear branding. Fake Facebook ads aim to trick you into sharing your personal information or paying for items that don’t exist. Continue reading to learn some of the most common signs of fake Facebook ads, how to avoid falling for these fake ads and what to do if you have already been scammed by them.

TDK Electronics Goes from Complexity to Confidence with CrowdStrike

TDK Electronics is a German manufacturer of electronic components, modules and systems. With more than 23,000 employees spread across 20 development and production sites worldwide, TDK serves a range of industries, including automotive, industrial and consumer electronics, IT and telecommunications.

What is Supply Chain Detection and Response?

Supply chain detection and response (SCDR) is a solution for supply chain incident responders that drives critical issue identification, vendor responsiveness, and time to incident resolution. SCDR solutions provide risk intelligence, AI-driven workflows, and collaboration capabilities to improve the security posture of your organization and your suppliers.

Anatomy of a Cyber Attack: The PAN-OS Firewall Zero-Day

On April 12, 2024, Palo Alto Networks published a security advisory detailing an actively exploited maximum severity zero-day vulnerability affecting the GlobalProtect feature of PAN-OS. Dubbed CVE-2024-3400, it was assigned the maximum critical severity score of 10.0 through the Common Vulnerability Scoring System (CVSS), meaning the potential for damage was large and the path to exploit was easy for cybercriminals.