Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Hacktivism Roundup Q1 2024: Warfare in the Digital World

The realm of hacktivism is rapidly expanding, its contours continually shifting and adapting to the geopolitical climate. Within this dynamic landscape, specific regions and industry sectors face heightened risks. Hacktivism, by its very essence, thrives in the public eye, as its actors strive to effect political or social change.

Expanding Horizons: LevelBlue Enhances MSSP Offerings with Government Cloud Support

In today's digital landscape, cybersecurity is paramount, especially for government agencies entrusted with safeguarding sensitive data and critical infrastructure. Recognizing this need, LevelBlue is proud to announce the availability of its latest offering: support for Managed Security Service Providers (MSSPs) in the Government Cloud.

Seattle Kraken Deploy WatchGuard's Unified Security Platform

We’re proud to announce the recent deployment of our Unified Security Platform architecture for the Seattle Kraken, providing comprehensive protection against cyber threats for the NHL’s 32nd franchise. The Kraken now rely on WatchGuard to provide complete protection for their organization as the official cybersecurity sponsor of the Seattle Kraken.

Symmetric vs. asymmetric encryption: Practical Python examples

Symmetric and asymmetric encryption are the two most common ways to protect sensitive data with cryptography. These methods use key(s) to transform an unencrypted message into an encrypted message (a ciphertext) that is extremely difficult to decrypt without the correct key(s). Symmetric encryption uses a single key to encrypt and decrypt data. In contrast, asymmetric encryption uses a pair of keys, a public and private key, to encrypt and decrypt sensitive data.

Offensive Security Services: How to Improve Security by Thinking Like an Adversary

Taking a proactive approach to cybersecurity is essential for safeguarding sensitive data and systems from potential threats. By adopting an offensive security strategy, organizations can identify and mitigate vulnerabilities and risks before they are exploited by malicious actors.

NVD Update: More Problems, More Letters, Some Questions Answered

The past week has been a wild ride for those following all the hot goss’ on the National Vulnerability Database. Previously on The Code and the Vulnerable, we reported on the NVD slowdown that began in mid February. Since then, the NVD has been adding new CVEs, but has only enriched (with important information like CVSS and CPE) a very small fraction of them. If you need a breakdown of all these acronyms, definitely check out that first blog on this topic.

FBI Warns of AI-Assisted Phishing Campaigns

The US Federal Bureau of Investigation’s (FBI’s) San Francisco division warns that threat actors are increasingly using AI tools to improve their social engineering attacks. “AI provides augmented and enhanced capabilities to schemes that attackers already use and increases cyber-attack speed, scale, and automation,” the FBI says.

Compliance, collaboration, and communication: The benefits of NIST CSF 2.0

As regulatory mandates and frameworks continue to emerge, cybersecurity leaders must continue to adapt to more than just the latest threat actor tactics, techniques, and procedures. As part of our ongoing webinar series centered on compliance, SecurityScorecard’s Senior Product Marketing Manager, Devaney Devoe, moderated a discussion with Adam Bixler (Principal, Squadra Ventures), Christopher Strand (SecurityScorecard’s Global Risk Officer), and Steve Cobb (CISO, SecurityScorecard).

How Should Sensitive Information Be Stored?

When we think about storing sensitive information, two types of information come to mind: digital data and physical data. While physical data can be securely stored in a physical vault, digital data should be stored in an encrypted cloud storage solution to protect it from common cyber threats. Continue reading to learn the best ways to store your sensitive physical and digital information, plus the storage methods to avoid.

Fall of Major Ransomware Groups Sparks Rapid Rise of New Threats

In 2023, international law enforcement agencies intensified their efforts against ransomware, resulting in the decline of groups such as Hive, Ragnar Locker, and the collapse of ALPHV (BlackCat). These actions underscore the growing challenges faced by ransomware groups. The significant operation in February 2024 targeting LockBit, which included arrests and the seizure of data leak sites and servers, represents one of the largest law enforcement actions taken against a major ransomware operation.