Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The New InfoStealer in Town: The Continental Stealer

In the last several days, a new info stealer known as the “Continental stealer” has gained traction in dark web forums. This stealer has the potential to become one of the more powerful participants in the InfoStealer industry, thanks to its simple and easy-to-use architecture. In this report, we will review the stealer infrastructure, features, and functionality.

Protecting your Enterprise with Penetration Testing

In the arsenal of cyber security tools available to organizations, the penetration test is a key component. Business applications, and organization infrastructure (operating systems, databases, networks, etc.) all have potential vulnerabilities, many of which are just waiting for threat actors to exploit.

Five worthy reads: The evolving face of cyber threats-phishing, vishing, CEO fraud, and more

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we are exploring the modern cyberthreat landscape and how crucial it is to keep up with cybercriminals’ evolving tactics and safeguard ourselves from them. The modern cyberthreat landscape is an ever-evolving and complex environment that poses significant risks to organizations of all sizes.

Building Secure and Compliant SaaS Apps - Identity Security Best Practices

Do you need to secure high-risk access to the back end of your customer-facing apps? Yes, you do – assuming you care about cybersecurity risk, uptime or compliance with SOC II and NIST and AWS, Azure and GCP architecture frameworks. To meet compliance requirements and grow your business, you must properly secure access to the cloud services and workloads powering your SaaS app.

The Ultimate Guide to Cyber Threat Intelligence

In an era where cyber threats are increasingly sophisticated and ubiquitous, businesses must remain vigilant and proactive in their approach to security. Cyber threat intelligence (TI or CTI) emerges as a beacon of hope, offering insights and strategies to detect, prevent, and respond to potential cyberattacks. Through this guide, we'll walk you through what TI is, different types of TI, and how it reshapes our understanding of cybersecurity.

What is an API Gateway? - Definition, Benefits and Limitations

An API Gateway is a mediator between the client and the collection of backend services. It accepts all API calls and routes them to one or more appropriate backend services. It doesn’t stop there; it aggregates appropriate data/ resources and delivers it to the user in a unified manner. Placed in front of the API/ group of microservices, the API gateway is the single-entry point for all API calls made to and executed by the app.

CVE-2023-46604: Critical RCE Vulnerability in Apache ActiveMQ

On October 27, 2023, Apache published a security advisory addressing that a critical remote code execution (RCE) vulnerability has been fixed in the latest updates for Apache ActiveMQ products, CVE-2023-46604. This vulnerability was rated with a maximum Common Vulnerability Scoring System (CVSS) score of 10.0, as it can be exploited remotely by an unauthenticated threat actor in low complexity attacks.

Exploitation of CVE-2023-46604 in Apache ActiveMQ Leads to TellYouThePass Ransomware

This article aims to share timely and relevant information about a rapidly developing campaign under investigation. We are publishing it as early as possible for the benefit of the cybersecurity community, and we may provide updates in the near future once more details become available in our research.

Why White Label Cloud Services are Important to MSP's

What Are White Label Cloud Services? White-label cloud services are cloud solutions that are provided by a third-party vendor but can be rebranded and customized to fit the branding and requirements of the MSP or their clients. Essentially, white-label cloud services allow MSPs to offer cloud-based solutions under their own brand, enabling them to maintain consistency in their service offerings and provide a more cohesive experience to their clients.