Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cyberattacks in the education sector up 258% last academic year

Cybercriminals are targeting educational institutions, attracted by the vast amount of sensitive data they handle: student and employee personal information, research, and intellectual property. With tight technology budgets and often weak defenses, many of these organizations are easy prey for increasingly complex cyberattacks, putting their reputation and operations at risk.

Not All Synthetic Data is the Same: A Framework for Generating Realistic Data

A common misconception about synthetic data is that it’s all created equally. In reality, generating synthetic data for complex, nuanced use cases — like healthcare prescription data — can be exponentially more challenging than building a dataset for weather simulations. The goal of synthetic data isn’t just to simulate but to closely approximate real-world scenarios.

Novel Exploit Chain Enables Windows UAC Bypass: Understanding CVE-2024-6769

Researchers have uncovered a new vulnerability, tracked as CVE-2024-6769, which enables attackers to bypass Windows User Access Control (UAC) and elevate their privileges to gain full system control without triggering any alerts. This exploit, affecting Microsoft’s Windows platform, has sparked debate about whether UAC truly acts as a security boundary. While Microsoft does not classify this as a vulnerability, security experts warn organizations to be vigilant about the risks involved.

How to get your Cyber Essentials certification: A process guide

Most organizations today are heavily reliant on technology, regardless of the product or service they provide. This expands their data exposure points and potential attack surface, which is why there is a significant need to monitor the risks and vulnerabilities in the cybersecurity landscape. ‍ Cyber Essentials certification is a comprehensive cybersecurity strategy involving vigilance over various scattered technologies, policies, and controls.

ZTNA vs VPN - Whats the Best Security Solution?

Work from home (WFH) remains a common practice for many businesses worldwide. This working model has enabled companies to hire top talent across borders, boost revenue, and improve employees work-life balance. A new report by Tata Consultancy Services (TCS) claims that, by 2025, 40% of employees around the world will work from home. However, this growing trend also brings about a range of cybersecurity risks that could impact businesses significantly.

Linux Kernel effected by CVE-2023-2163

CVE-2023-2163 is a critical vulnerability in the Linux Kernel, specifically affecting kernel versions 5.4 and above (excluding 6.3). This vulnerability arises from incorrect verifier pruning in the Berkeley Packet Filter (BPF), leading to unsafe code paths being incorrectly marked as safe. The vulnerability has a CVSS v3.1 Base Score of 8.8, indicating its high severity. The consequences are arbitrary read/write in kernel memory, lateral privilege escalation and container escape.

New Features in Teleport Policy provide more insight into infrastructure policy risks

As modern organizations grow in size and complexity, managing secure access to computing infrastructure becomes a top priority. Teleport has introduced new features in Teleport Policy 16 aimed at making this easier and more efficient. With these enhancements, organizations can take a more proactive approach to security, ensuring better oversight and reducing potential risks.

LLM Security: Leveraging OWASP's Top 10 for LLM Applications

Large Language Models (LLMs) transform how organizations process and analyze vast amounts of data. However, with their increasing capabilities comes heightened concern about LLM security. The OWASP Top 10 for LLMs offers a guideline to address these risks. Originally designed to identify common vulnerabilities in web applications, OWASP has now extended its focus to AI-driven technologies. This is essential as LLMs are prone to unique LLM vulnerabilities that traditional security measures may overlook.

Assessing and Prioritizing Risk in Your Infrastructure

There are lots of hurdles to jump when trying to set up and maintain a SIEM. Preparing infrastructure and installing the software components, getting logs ingested into the system, parsing and normalizing those log messages properly, configuring alerts for detection, etc. These are all large tasks that require thoughtful planning and a lot of work to get right. But let’s say you’ve managed to clear all those hurdles…in that case, great job!!