Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CVE-2023-38547 & CVE-2023-38548: Two Critical Vulnerabilities in Veeam ONE

On November 6, 2023, Veeam published security hotfixes for two critical-severity vulnerabilities impacting Veeam ONE. At this time, Arctic Wolf has not identified active exploitation of either vulnerability, nor a published proof of concept (PoC) exploit. Although threat actors have not historically targeted Veeam ONE products, obtaining RCE on the monitoring and analytics platform will likely increase the potential for threat actors to create a working PoC exploit and attempt exploitation.

Monitor expiration events from Azure Key Vault

For customers using Azure Key Vault—which helps them safeguard sensitive keys and secrets used by applications and services hosted on Azure—it can be challenging to determine when the resources in their Key Vault(s) are about to expire. Invalid keys and secrets can disrupt your day-to-day workflows by causing application downtime, holding up incident investigations, invalidating compliance, slowing down the development of new features, and more.

Collect Google Cloud Armor logs with Datadog

As the internet continues to evolve, cybersecurity threats—particularly Distributed Denial of Service (DDoS) attacks—are an increasingly significant concern for organizations. In this post, we’ll look at how you can use Datadog to collect Google Cloud Armor (GCA) logs and detect and respond to potential DDoS attacks in real-time. But first, we’ll briefly cover what DDoS attacks are and how they work.

What is Adaptive Security (Definition and Implementation)

Adaptive security is an approach to cybersecurity that helps your Security Operations Center (SOC) quickly adapt to the latest threats. By implementing adaptive security, your organization can evaluate and analyze behaviors and events in real-time to take preventative action before a breach.

Scalpers Force Barbie Collectors to Pay up to 1,200% More for Stevie Nicks Doll

Scalpers aren’t just interested in snagging the final Yeezy drops, the newest Air Jordans or tickets to see Taylor Swift on tour. They’ve also been saying “Hey, Barbie” to the latest Mattel collaboration with rock icon and Barbie enthusiast Stevie Nicks. Evidence gathered by Netacea suggests that scalper bots were involved when pre-orders for the limited-edition Stevie Nicks Barbie, unveiled by the Fleetwood Mac legend during a recent concert, sold out almost immediately.

3 Best Third-Party Risk Management Software Solutions in 2023

From U.S. executive orders to cyber regulations, prominent cybersecurity policies are increasing their inclusion of Third-Party Risk Management standards, and for good reason - every organization, no matter what size, is impacted by third-party risks. If you're looking for a TPRM software solution to enhance the efficiency of your TPRM program, this post will help you evaluate the top contenders in the market.

Fraud Prevention Tips

To prevent becoming a victim of fraud, you should always keep your data in a secure location, protect your online accounts with strong passwords and Multi-Factor Authentication (MFA), sign up for a dark web monitoring service to receive dark web alerts, learn to spot phishing scams and more. Continue reading to learn more about fraud prevention tips you should be following.

City of Huber Heights Targeted by Ransomware Attack Sunday

The City of Huber Heights is in east Ohio, north of Dayton. The suburban area has a population of around 50,000, but other populated areas are nearby. Sunday morning, November 12th, 2023, the City of Huber Heights was subject to a ransomware attack; the investigation is ongoing, as the attack disrupted many City divisions.

Digital Trust: Why SEO Poisoning is on the Rise

In the digital age, human interactions have been slowly replaced with online substitutions. We’re so used to depending on computers to perform tasks on our behalf that attackers are increasingly exploiting this trust mechanism for malicious gain. We are living in an age of unprecedented connectivity and convenience. Our daily lives are entwined with technology, from online shopping to managing our finances, to discussing key documents and answering queries in the workplace.

Embracing Risk for a Brighter Tomorrow

Once upon a time in the world of business, risk was seen as something to be feared, a looming specter of potential failure. However, in a time of rapid change and innovation, a new perspective emerged, one that recognizes the positive potential of risk as a catalyst for growth and transformation. If you missed our recent RiskInsider Webinar and couldn’t attend the IIA/ISACA GRC Conference, let me fill you in on how you can embrace risk for a brighter tomorrow.