Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

An investigation into code injection vulnerabilities caused by generative AI

Generative AI is an exciting technology that is now easily available through cloud APIs provided by companies such as Google and OpenAI. While it’s a powerful tool, the use of generative AI within code opens up additional security considerations that developers must take into account to ensure that their applications remain secure. In this article, we look at the potential security implications of large language models (LLMs), a text-producing form of generative AI.

Netskope Threat Coverage: Evil Ant Ransomware

Netskope Threat Labs recently analyzed a new ransomware strain named Evil Ant. Evil Ant ransomware is a Python-based malware compiled using PyInstaller that looks to encrypt all files stored on the victim’s personal folders and external drives. This ransomware strain requires process continuity from encryption until file recovery. Rebooting, shutting down, or ending the ransomware process will make affected files unrecoverable.

The NFL's George Griesler on securing the Super Bowl and reducing risk through collaboration

In this week’s episode of The Future of Security Operations podcast, I'm joined by George Griesler. George has been working in cybersecurity since 1997, when he assumed the role of Senior Network administrator at the United States Golf Association (USGA), eventually advancing to Director of Information Security.

How To Prevent Brute Force Attacks

Brute force attacks are one of the most common methods used by cybercriminals to steal credentials from organizations. To prevent brute force attacks, organizations need to enforce the use of strong and unique passwords, invest in a business password manager, require employees to enable MFA, monitor and limit login attempts, implement passwordless authentication and delete inactive accounts.

Tutorial: Learn the Basics of Active Directory

Active Directory (AD) is the cornerstone of any on-premises or hybrid Microsoft environment. It stores information about users, computers and other objects, and provides vital services that enable employees to be productive and business processes to run. This article covers the Active Directory basics you need to know.

SCM and NERC: What You Need to Know

Security configurations are an often ignored but essential factor in any organization’s security posture: any tool, program, or solution can be vulnerable to cyberattacks or other security incidents if the settings are not configured correctly. Staying on top of all of these security configurations can be a daunting responsibility for security or IT teams to focus on, which is where security configuration management (SCM) comes in.

Guide to Group Policy Management in Active Directory

Group Policy is a feature of Microsoft Windows operating systems that helps administrators manage and secure users and computers in Active Directory environments. Group Policy settings are grouped into Group Policy objects (GPOs) and applied to computer and user objects within the scope of the GPO. For example, Group Policy objects can be used to manage: This guide explains the key elements of Group Policy management.

Making BYOD Work, Safely

Achieving an effective bring-your-own-device (BYOD) program has been aspirational for many IT organizations. There are explicit security and privacy concerns, which have led many admins to sour on the concept, despite its benefits. Admins have even reluctantly accepted the risk of personal PCs being left unmanaged, which leaves gaps in management and visibility.

The Top 9 Data Exfiltration Prevention Solutions in 2024

With the growing dependence of businesses on digital platforms for storing and processing sensitive information, the threat of data exfiltration has become a pressing issue. The evolution of exfiltration techniques has given rise to threat actors who exploit insecure devices and engage in suspicious activities to steal valuable data. These activities often involve unauthorized physical access or social engineering attacks to obtain login credentials with malicious intent.