Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Google's Transition to Rust Programming Reduces Android Memory Vulnerabilities by 52%

In a significant move towards enhancing the security of its Android operating system, Google has announced a substantial reduction in memory vulnerabilities by adopting memory-safe programming languages, particularly Rust. This shift aligns with Google's secure-by-design philosophy, aiming to minimize security risks associated with new code development. In this blog, we’ll explore the implications of this transition, the statistical outcomes, and what this means for the future of secure coding.

Navigating Complex Cloud Environments with CIEM

Securing complex cloud environments is as crucial as it is challenging. The surface area for attack is vast. With the elastic nature of cloud resources, a single compromised service could allow attackers to take over large portions of your infrastructure, often lurking undetected for extended periods. This presents a significant risk to your organization, as your dynamic and ever-evolving cloud environment makes it difficult to maintain control over who has access to what.

Cicada3301 Ransomware, LummaC2 Infostealer, Obfuscated Net Loader, and More: Hacker's Playbook Threat Coverage Round-up: September 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for several new threats. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats. Additional details about the threats and our coverage can be seen below.

When Is ISO 27001 Considered Mandatory? 5 Examples

ISO 27001 is the international standard for information security and protection. It’s roughly equivalent to similar infosec frameworks in the United States, like FedRAMP and CMMC, but the international development, maintenance, and scope of the ISO framework makes it much more commonly seen outside of US Government contracting. In the US, it’s clear that a security framework mandated by the government is required when working as a contractor for the government. What about ISO 27001?

BDRSuite Awarded G2 Leader Badge and High Performer Badge in Fall 2024

The Fall 2024 G2 Report have been released, and BDRSuite is proud to announce that we received 16 badges! BDRSuite achieved a remarkable positive rating on G2. This positive rating reflects the satisfaction of our users across various categories, including ease of use and quality of support..

What is Threat Detection and Response?

Attackers nowadays are good at setting up camp in networks and stealing important information. This means you need to be on your toes with top-notch threat spotting. You need something that can handle the whole attack process, from when they first break in to when they move around and take data.

Advancing cybersecurity: Cloudflare implements a new bug bounty VIP program as part of CISA Pledge commitment

As our digital world becomes increasingly more complex, the importance of cybersecurity grows ever more critical. As a result, Cloudflare is proud to promote our commitment to the Cybersecurity and Infrastructure Security Agency (CISA) ‘Secure by Design’ pledge. The commitment is built around seven security goals, aimed at enhancing the safety of our products and delivering the most secure solutions to our customers.

Unix CUPS Unauthenticated RCE Zero-Day Vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177): All you need to know

On September 23rd, Twitter user Simone Margaritelli (@evilsocket) announced that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which affects almost all Linux distributions, and that the public disclosure will happen on September 30th, Due to a suspected leak in the disclosure process, @evilsocket decided to advance the disclosure, and on September 26th, the vulnerabilities were disclosed in @evilsocket’s blog, along with a full proof of concept.

How To Set Up And Manage Multiple GitHub Accounts

Are you in between personal and work projects or maybe just managing multiple professional accounts from a single machine? Then, this article is here to help you simplify your Git configuration and management processes. Managing multiple GitHub accounts on a single machine doesn’t have to be complicated.