Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

My Hacker Story: A Cautionary Tale of Intern Antics and Cultural Learnings

My hacker story does not paint me in the best light, and it is not intended to. I am a firm believer in sharing one's mistakes and being open to learning from them. My incident taught me so much, and many years later, I am still benefiting from the learning opportunities. As the wise quote goes, "We have met the enemy, and they are us" — a sentiment that perfectly sums up my experience.

Gaining Network Transparency with Asset Discovery and Compliance for IT/OT

I recently came across the "Johari Window Model" and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that are applicable not just to IT and OT environments but also to other facets of our daily lives. This model can be applied to asset discovery and Fortra's Security Configuration Management (SCM) system.

CVE-2024-37079 & CVE-2024-37080: Critical Heap-overflow Remote Code Execution Vulnerabilities in VMware vCenter Server and Cloud Foundation

On June 17, 2024, VMware disclosed two critical vulnerabilities (CVE-2024-37079 & CVE-2024-37080) affecting vCenter Server and Cloud Foundation. These vulnerabilities stem from a heap-overflow issue in the implementation of the DCERPC protocol which can be exploited by remote threat actors. By sending specially crafted network packets, threat actors could exploit CVE-2024-37079 and CVE-2024-37080 to achieve Remote Code Execution (RCE) on both vCenter Server and Cloud Foundation systems.

7 Challenges in Scaling SOC Operations and How to Overcome Them

In the past four years, cyberattacks have more than doubled. Cybercriminals are leveraging emerging technologies like artificial intelligence (AI) to facilitate more sophisticated attacks. Geopolitical tumult has increased cyber risk. Couple these factors with a near-ubiquitous desire for businesses to expand their operations, and it’s easy to understand the need for scaling Security Operations Center (SOC) operations.

Comprehensive Digital Risk Defense: Dark Web Monitoring | Cyber Threat Intelligence | Digital Risk Protection

Many people mistakenly believe that the dark web is an obscure corner of the internet that doesn't affect them, but the reality is far more concerning. Dark web monitoring is crucial for identifying potential threats that can jeopardize personal and organizational security. From stolen data and illegal goods to sophisticated cyber threats like ransomware and phishing attacks, the dark web is a breeding ground for malicious activities.

Understanding Vulnerability Prioritization, Management & Remediation

What are your most important corporate assets? Like most companies, you probably have mission-critical assets and those that play a smaller role in your revenue and continuity. You are also likely to be using Vulnerability Management or Assessment tools to lock down where those assets can potentially be compromised. Vulnerability Prioritization combines asset importance and potential for risk.

Exploring the Latest Trends in IoT Security

As our world becomes more connected, keeping up with the latest trends in IoT security is a must for businesses aiming to boost efficiency, enhance customer experiences, and stay ahead of the competition. Let’s dive into the key trends shaping the IoT landscape today and how we are working to make it more secure, from advancements in AI to post-quantum cryptography and cyber resilience.

Understanding and Addressing Data Security Challenges

The exponential growth of data in today’s digital age brings both enormous opportunities and significant challenges for businesses. While data drives innovation, personalizes customer experiences, and informs strategic decisions, protecting this important asset necessitates a strong and constantly evolving security posture. This blog goes into the fundamentals of data security, examines the challenges and issues that companies face, and proposes concrete methods for effective data protection.

Creating symbolic links - Like shortcuts but better

The create symbolic links user right determines the users ability to create a symbolic link within Windows from the device they’re logged on to. These links point to other files or folders, just like regular shortcuts, but works in a more advanced way. Symbolic links help maintain organization and flexibility while minimizing potential security risks by giving the ability to create a link in one folder that points to a file in a different folder, making it seem like the file exists in both places.

IoT Security Regulations: A Compliance Checklist - Part 1

The Internet of Things (IoT) refers to the global network of physical devices connected to the internet, capable of collecting and sharing data. IoT devices range from everyday household items to sophisticated industrial tools. By integrating sensors and communication hardware, IoT bridges the gap between the physical and digital worlds, enabling environments where smart devices operate interconnectedly and autonomously.