Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Security warning! All of us are victims of open-source vulnerabilities

Picture this: A user on your network casually explores the internet and scrolls through a website’s comment section. However, a lurking threat known as cross-site scripting (XSS) is poised to exploit vulnerabilities and steal their session cookies, which includes sensitive data such as their logon credentials. But how does this nefarious scheme unfold, and what other open-source vulnerabilities could be exploited in the process?

ShadowIT, Hidden Risk, and the insights that drive action to reduce exposure

The annual doctor wellness check always interests me. It’s generally the same routine every year: The doctor and I exchange pleasantries. She asks about any noticeable health changes while looking in my ears with that cool little penlight. If I’m lucky, she uses the mini-hammer to see how high my leg kicks after a gentle knee tap (I just love that for some reason). But it’s all a bit of a show, isn’t it?

Create SBOM on Gradle with the CycloneDX Plugin

The Software Bill of Materials (SBOM) has become essential in application security as it provides a comprehensive list of every element within a software build. This is important because vulnerabilities can often emerge in third-party or transitive dependencies, not just in the main code. SBOM is used not only for vulnerability discovery but also to detect and understand open-source license violations in advance.

3 Tips for Cost Optimization With AWS

As many companies begin to explore the vast capabilities of the public cloud ecosystem, one obstacle continues to be of extreme importance: Cost Optimization. The cloud itself was built for scalability and convenience, but when the most advanced options for your infrastructure can be set up with the touch of a button, a cost friendly migration and ongoing strategy to keep your cloud footprint within budget are key.

KnowBe4 Named a Leader in the Winter 2024 G2 Grid Report for Security Awareness Training

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence. Based on 1,455 G2 customer reviews, KnowBe4’s KMSAT is the top ranked SAT platform with 98% of users rating 4 or 5 stars. The KMSAT platform received the highest G2 score among products in the SAT category with a score of 93 out of 100.

Reviewing the Proposed CMMC Regulations: Key Takeaways and Recommendations

The U.S. Department of Defense (DoD) delivered a timely Christmas gift to government contractors and subcontractors last month – the proposed regulations for the Cybersecurity Maturity Model Certification (CMMC) program. After over two years in development, the proposed rule, released on December 26, 2023, aims to enhance cybersecurity compliance across the defense industrial base.

Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code

Python, as a versatile and widely used programming language, has an extensive ecosystem of modules and packages. As you navigate this ecosystem, it's important to understand the role of virtual environments. In this article, we will delve into what virtual environments are, why developers need them, and some common tools for creating Python virtual environments.

MSS: (DisableIPSourceRouting) IP source routing protection level (protect against packet spoofing)

Optimally configuring “DisableIPSourceRouting” parameter enhances security by mitigating the risk of denial-of-service (DOS) attacks through packet spoofing. In such attacks, the goal is to inundate the target with high volumes of traffic, and using spoofed IP addresses makes it challenging to filter and identify the true source of the attack. Server hardening can be arduous. CSH by CalCom automates the process, learning your network to eliminate the need for testing.

Social engineering attacks: Real-life examples and how to avoid them

In the ever-evolving landscape of cybersecurity threats, social engineering remains a potent and insidious method employed by cybercriminals. Unlike traditional hacking techniques that exploit software vulnerabilities, social engineering manipulates human psychology to gain unauthorized access to sensitive information.

The Need For a Shift Up Strategy, Using CRQ for Resilience, Part 1

In the cyber age, data has become nearly as valuable as oil. While this market shift offers many new learning and growth opportunities for professionals across industries, the immeasurable amount of data is often quite overwhelming to non-analysts, leaving them feeling more lost than when they began their inquiries. ‍ This situation often rings true for cybersecurity leaders tasked with protecting an organization's digital assets against attacks and increasingly malicious actors.