Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO Advisory Board Response to The State of Data Security: Securing an Uncertain Future

Rubrik Zero Labs’ recent study accentuated several hard truths we think are important and warrant a response from Rubrik’s CISO Advisory Board. First, let’s confirm what many of us have already discussed: It’s not fun to be a CISO right now. There’s an overwhelming amount of expectation—from the board to business unit owners—to figure out how to grow and use data, but also keep it secure, and figure out what happens when it’s not.

The eCommerce Manager's Guide to Bot Protection

Are you an eCommerce Manager who keeps being asked about bot visitors by security and fraud teams? You’re not alone, as the issue of bot attacks such as scalping, scraping and account takeover cross multiple business functions – everyone has their role in stopping bad bots. It’s time to up your bot knowledge and do your part in mitigating these attacks. Here’s what you need to know.

Wallarm to Unveil New API Security Solution and Strategic Shift at Black Hat Europe 2023

If you're involved with cybersecurity and are based in Europe, then Black Hat Europe 2023 in London, December 6 and 7 is a must-attend event. Wallarm, the experts in API and Application Security, will be attending the event, and we're excited to connect with you. If you are planning to attend, come by our booth or feel free to schedule a slot to meet with our API and App Security experts.

Grow Your Business with a 24/7 Security Operations Center (SOC) using Open Source Technologies.

Keeping IT Services profitable can be challenging, equipment and software costs increase, margins suffer and customers cancel. The solution resides in the economy of horizontal scale. Imagine what could happen if your existing customers contracted two times more services from your business, would that help? Sell them something every business needs: cybersecurity, launch your own Security Operations Center, and close new profitable deals. Why UTMStack and not something else? The answer is simple: UTMStack is free and Open source and very intuitive, so you can hit the ground up and running in no time.

CVE-2023-41265, CVE-2023-41266 & CVE-2023-48365: Multiple Vulnerabilities in Qlik Sense Enterprise Actively Exploited

Arctic Wolf has recently worked multiple incident response cases where we have observed ransomware groups exploiting CVE-2023-41265, CVE-2023-41266 & CVE-2023-48365 to gain initial access. On August 29, 2023, Qlik published a support article detailing two vulnerabilities which when successfully exploited in tandem could lead to an unauthenticated threat actor achieving remote code execution (RCE). CVE-2023-41266.

Qlik Sense Exploited in Cactus Ransomware Campaign

Arctic Wolf Labs has observed a new Cactus ransomware campaign which exploits publicly-exposed installations of Qlik Sense, a cloud analytics and business intelligence platform.[1] Based on available evidence, we assess that all vulnerabilities exploited were previously identified by researchers from Praetorian [2,3]. For more information on these vulnerabilities, see the advisories published by Qlik (CVE-2023-41266, CVE-2023-41265, and CVE-2023-48365) as well as our Security Bulletin.

The CISO View: Navigating the Promise and Pitfalls of Cybersecurity Automation

Cybersecurity automation has steadily gained traction as organizations seek to improve efficiency, address talent gaps, and keep up with escalating threats. However, our latest State of Cybersecurity Automation research shows that while more businesses are utilizing automation, they continue to grapple with obstacles that prevent them from fully capitalizing on its benefits.

EP 40 - The Identity of Things

Today’s Trust Issues guest is Brian Contos, Chief Strategy Officer at Sevco Security. With host David Puner, Contos discusses the intricacies of securing the Internet of Things (IoT) and the challenges posed by the expanding IoT landscape – emphasizing the need for robust identity management. In a broader context, IoT encompasses identity management, cybersecurity and the evolving role of AI in safeguarding digital assets.