Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus state-sponsored actor that CrowdStrike Counter Adversary Operations tracks as LIMINAL PANDA.

Redefining Modern Security with the Introduction of the Arctic Wolf Aurora Platform, Powered by Alpha AI

In today’s rapidly evolving threat landscape, where cyberattacks grow more sophisticated by the day, staying ahead requires more than vigilance—it demands a platform built to operate at scale. Enter the Arctic Wolf Aurora Platform, the new name for our industry-leading security operations platform. With the ability to process over seven trillion events weekly, The Aurora Platform stands as one of the largest and most advanced cybersecurity platforms in our industry.

Security training - How to ensure your training is effective

The best way to solve this issue is to provide training that is interesting, interactive, and engaging. A great example would be the Defense.com videos offered. They provide a fun, informative and. with the inclusion of exams, interactive way to train staff on cyber security. Even just informal quiz sheets could help staff retain the information and put it into practice when the situation arises.

New Strategies to Auto Block Website Ping Attack for Enhanced Security

It is more important than ever to protect websites from hacking in today's digital world. One common type of attack is the Ping Flood, also called the "Ping of Death." This is when a lot of ping requests are sent to a website's server at once, slowing it down or even crashing it. Attacks like these are more likely to happen as websites get busier and more complicated. This is why it's important to have strong defenses in place.

Understanding Polymorphic Viruses and Polymorphic Malware

Polymorphic viruses and polymorphic malware represent some of the most sophisticated challenges in modern business. These types of malware are designed to evade traditional cyber security measures by constantly changing their appearance making them particularly difficult to detect and eliminate.

Fraud Week: The Insider Threat Risk that Companies Ignore at their Peril

External risks, such as cyber scams, ransomware, and identity theft, often steal the limelight. Just look at the numbers: our threat lab reports that 105,571 malware attacks have been blocked daily in the last month, translating into one incident every second. However, insider threats, while more difficult to detect, can be just as damaging to organizations.

Ask the Experts: Black Friday Bot Attacks

As Black Friday approaches, retailers are gearing up for the inevitable surge in online traffic. But cybercriminals are also preparing for this high-stakes season, fine-tuning their bot attack strategies to exploit inventory, pricing, and customer accounts. To shed light on these threats and what retailers can do to prepare, we consulted five experts from Netacea who shared their insights on the bot attack landscape during Black Friday and beyond.

What is Blind XSS? How to Detect and Prevent Blind XSS Attacks & Vulnerabilities?

Blind Cross-Site Scripting is a type of Cross-Site Scripting attack in which the injected script is executed in the context of another page and different circumstances compared to the page in which it was inserted. Blind XSS differs from regular XSS attacks as the attacker cannot see the effect of the injected script in his or her browser since the script is executed in a place that the attacker can not access.

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching

There is no doubt about the value of conducting Managed Vulnerability Scanning. Trustwave has posted multiple blogs on the topic, (just check here, here, and here) for a look at how Trustwave approaches this very important cybersecurity procedure. One point we have not covered is exactly what kind of vulnerabilities Trustwave SpiderLabs’ analysts find during a scan. Are they truly dangerous? What would happen if the client had opted to give a pass to an MVS occurrence?