Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Best Practices For Securing Your Login Page Attack Surface

When managing an organization’s attack surface, the focus often falls on broad categories like firewalls, endpoints, or software vulnerabilities. Yet, one obvious blind spot is login pages. Login pages are not just entry points for users but potential gateways for attackers. From an EASM point of view, login pages pose important security concerns because of their exposure to the Internet.

The Cyber Helpline Wins Not-for-Profit Cyber Award at 2024 National Cyber Awards

London, UK, September 24th, 2024 – We are thrilled to announce that The Cyber Helpline has emerged victorious at this year’s National Cyber Awards, securing three prestigious awards! For the fourth year in a row, we have been honored as the Not-for-Profit Cyber Award winner, alongside recognition for individual achievements, including the Alan Turing Award (Rory Innes) and the Cyber Student of the Year Award (Alex Hardy).

CCPA Compliance Guide: How to Get Your Business CCPA Compliant

Over the past few years, businesses have been fighting against the threat of data breaches and cyberattacks, and customers are trying to find new ways to protect their privacy online and keep their data safe from being shared with third parties. Since 2018, the California Consumer Privacy Act and others, such as the GDPR, have made it a legal obligation for companies to protect user data. As a result, other states are starting to follow suit.

The Machine War Has Begun: Cybercriminals Leveraging AI in DDoS Attacks

In the digital landscape, the integration of Artificial Intelligence (AI) into cybercriminal activities has marked the beginning of a new era of threats. The “machine war” has indeed commenced, with AI enhancing the scale and sophistication of cyberattacks. Distributed denial of service (DDoS) attacks, in particular, have become more formidable with AI’s capabilities, presenting significant challenges for cybersecurity defenses.

Deciphering the Loss Exceedance Curve in Cyber Risk Quantification

On-demand cyber risk quantification (CRQ) models have the power to assess an organization’s unique risk profile and, subsequently, generate data-driven insights that facilitate informed risk management decisions. The basis of these insights is grounded on a probabilistic approach to event forecasting, which involves simulating thousands of potential cyber scenarios a business may experience over a given period, typically the upcoming year.

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

HTML smuggling techniques have been around for quite some time. A previous Trustwave SpiderLabs’ blog discussed its use in distributing malware by storing binaries in immutable blob data within JavaScript code that gets decoded on the client-side browser, eventually delivering the payload.

Stay Focused on Relevant Threat Intel Through Scoring and Expiration

John Lennon popularized the phrase, “Life is what happens when you’re making other plans.” And that’s an apt characterization for how we think about threat intelligence. We tend to focus on it to block or alert-on an attack. Meanwhile life is what’s happening to our threat intel while we’re making these plans. When we don’t pay attention to the threat intelligence lifecycle, we can run into trouble.

CVE-2024-8190 - OS Command Injection in Ivanti CSA

A high severity OS command injection vulnerability, CVE-2024-8190, has been found in Ivanti Cloud Services Appliance (CSA) versions 4.6 Patch 518 and earlier. This flaw allows attackers with admin access to remotely execute malicious commands, potentially taking full control of the system. Ivanti has already released updates, but this command injection vulnerability is actively exploited in the wild, making immediate action critical.

Why the CISO & CIO Must Partner for Cyber Resilience

In today’s interconnected world, where the digital landscape is constantly evolving, the threats to an organization’s cybersecurity posture are more sophisticated and pervasive than ever before. Relying on traditional, largely prevention-focused cybersecurity tools and approaches is not enough. Cyber attacks are inevitable.