Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is an Exploit Kit?

An exploit kit is a toolkit that cybercriminals use to attack the security vulnerabilities of a system or device to distribute malware. An exploit is a bit of code that takes advantage of security vulnerabilities found within software and hardware. Cybercriminals collect these bits of code and compile them into a kit that can target multiple security vulnerabilities at once, and secretly install malware on devices.

SecurityScorecard Research Investigates Chinese Threat Actor Group

In late August, Microsoft published its analysis of espionage activity tied to a new threat actor group called Flax Typhoon, which is believed to operate on behalf of the People’s Republic of China (PRC). The group mainly targets Taiwanese critical infrastructure, including: government, education, manufacturing, and information technology sectors.

The benefits of business logic assessments

The digital realm is an ever-expanding universe, and web applications serve as the gateway to valuable customer data, sensitive information, and financial transactions. Threat actors and cybercriminals are constantly devising new techniques to exploit vulnerabilities within these applications. Further, data privacy is a paramount concern, and organizations are entrusted with safeguarding information.

Top Five Free and Open Source SIEM

In an age where cybersecurity is paramount, organizations must be vigilant in protecting their digital assets and sensitive information. Security Information and Event Management (SIEM) solutions are crucial in this endeavor, as they provide comprehensive visibility into an organization’s cybersecurity posture. While there are many commercial SIEM tools on the market, the pursuit of truly free and open-source SIEM solutions is gaining traction.

Build a 24/7 Security Operations Center (SOC) with Free and Open Source Technologies

Welcome to our comprehensive guide on building a 24/7 Security Operations Center (SOC) using free and open-source technologies. In the digital age, protecting your organization’s information assets has never been more important. Cyber threats are constantly evolving, and organizations of all sizes and industries are vulnerable to attacks.

Casinos Throughout New York Go Dark Following "Cybersecurity Event"

New York state’s video lottery gaming system receives management by Everi Holdings—a Las Vegas-born licensing operator; the New York State Gaming Commission (NYSGC) battled a cybersecurity event impacting casinos across the state last week. In 2020, the NY Council on Problem Gambling (NYCPG) published a report implying that 32% of residents were recreational or problem gamblers; if the report is accurate, over a million people could be at risk following the cybersecurity event.

The Discovery of F5 BIG-IP Vulnerability CVE-2023-46747

A critical vulnerability, known as CVE-2023-46747, has been discovered in the widely used F5 BIG-IP Configuration Utility. This vulnerability has been assigned a CVSS score of 9.8 (critical), denoting its high severity. What makes it particularly alarming is its potential to allow unauthenticated attackers to execute arbitrary system commands, which could lead to a compromise of the system.

Venom Control-RAT With a Sting

As the cybercrime industry continues to provide us with new Malware as a Service (MaaS) products, we have become used to seeing the operators advertising and developing the panels underground. An allegedly legitimate software company named Venom Control Software emerged, offering a Remote-Access-Tool (RAT) for “hackers and pen-testers”.