Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SSH Snake - Tanium Tech Talks #95

In January of 2024 the #Linux / Unix world was rocked by a script that worms its way through insecure SSH connections to map your environment. A team of two Tanium SMEs built content that you need to find and map your exposure, giving you the information necessary to remediate your environment. But #Windows and #MacOS are not off the hook. SSH services on other platforms have the same exposure. Use this Tanium content to find the issue everywhere it is applicable.

OpenSSH regreSSHion Vulnerability - The 443 Podcast - Episode 296

This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the U.S., a Korean internet service provider delivering malware to their customers, and a takeover of a popular JavaScript library gone hostile.

Defense Supply Chain Data Security

The defense supply chain is a complex network of partners that sell, manufacture, and distribute services or products to defense agencies worldwide. It is made up of both major corporations and smaller sub-suppliers. Each country has its own network of supply chain partners, including manufacturers, software, services and logistics providers that deliver products and services for military materiel applications.

MDR for MSPs: the key to strengthening your portfolio and protecting your customers

Managed service providers (MSPs) are key players in enterprise security, providing critical security services for customers who often lack in-house teams to manage them. However, the cyberthreat landscape is growing increasingly complex and challenging, even for these experts.

Uncover the Power of ThreatQ Platform: A Comprehensive Analysis

In the ever-evolving landscape of cybersecurity, organizations face a growing number of sophisticated threats. To stay ahead, they must leverage advanced threat intelligence solutions that allow organizations to not only provide comprehensive insights but also empower them to act swiftly and decisively against a wide variety of threats and vulnerabilities. Enter ThreatQuotient, a leading player in the digital threat intelligence management space.

Polyfill.io Supply Chain Attack: Malicious JavaScript Injection Puts Over 100k Websites At Risk

Polyfill.io helps web developers achieve cross-browser compatibility by automatically managing necessary polyfills. By adding a script tag to their HTML, developers can ensure that features like JavaScript functions, HTML5 elements, and various APIs work across different browsers. Originally developed by Andrew Betts, Polyfill.io injects JavaScript polyfill libraries based on the user agent or other characteristics, streamlining code maintenance.

Securing AI-Enhanced Applications: Zenity's Role in Low-Code/No-Code Development

The rapid rise of low-code and no-code platforms has democratized application development, enabling even non-technical business users to swiftly create critical business applications. However, this accessibility brings new security challenges, particularly with the integration of AI technologies such as copilots, which are used to automate tasks and enhance functionality within these platforms. Zenity enhances the security of these AI-integrated environments by managing and securing AI copilots.

Why and how to perform Telegram monitoring to protect your business

For threat actors, the Telegram app, which emphasizes user privacy, has become a favored hangout. As Dark Reading notes, “The cybercrime ecosystem now not only includes private communications platforms like I2P and Tor but also reaches across clear websites and Telegram channels.” Likewise, the U.S.