Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tanium Converge - Labs - Insider Threat

Tanium Tech Talks host Ashley McGlone spoke with attendees of Converge for highlights of the technical track: capture the flag (CTF), labs, and certifications. In this series you will get a feel for what it is like to attend in person and the many resources available during (and after) the event. Tanium Converge took place in Austin, Texas November 13-17, 2022.

Shift-Left Testing and Its Benefits

Testing practices have been shifting left in the software development process due to the growing challenge of developing and delivering high-quality, secure software at today’s competitive pace. Agile methodologies and the DevOps approach were created to address these needs. In this post, we’ll map out the basics of shift-left practices in the DevOps pipeline and discuss how to shift left your open source security and compliance testing. Contents hide 1 What does shift left mean?

Operational Technology Security Needs an Urgent Upgrade

Operational Technology (OT) security has been thrown into the spotlight in the wake of several recent high-profile supply chain attacks targeting critical infrastructure. Security incidents such as the Colonial Pipeline attack have re-established the critical significance of Operational Technology Security, especially for the global power and energy sector.

Why Online Passport Verification is practical for secure Digital Onboarding

There have been several reports of counterfeit passports. But what does a document verification for passport reveal? A passport is regarded as one of the most reliable sources of personal information. Passport verification checks the candidate’s personal information on the passport verification documents. It does not validate fraudulent passport issues, but just tampering with personal information to verify passport number and the passport MRZ code.

How to prevent a rootkit attack before it is too late?

A rootkit is a malicious software program that helps cybercriminals infiltrate a system and take control. Hackers use rootkits to carry out espionage, data theft, deploy other malware such as ransomware, and all without leaving a trace. Once a rootkit is installed on a device, it can intercept system calls, replace software and processes and be part of a larger exploit kit containing other modules such as keyloggers, data theft malware, or even cryptocurrency mining malware.

What's New in OT Visibility?

As the industrial sectors become more cyber-aware, OT visibility has become an important force towards protecting critical infrastructure. Yet, as OT Security progresses, the expansion of Industrial Internet of Things (IIoT) adds new challenges to maintaining pace with OT visibility. What once was a Whack-a-Mole game between security and its adversaries, now seems to be the same game between security and IIoT hyper-connectivity.

Lookout Discovers Hundreds of Predatory Loan Apps on Google Play and Apple App Store

Researchers at Lookout Threat Lab have discovered close to 300 mobile loan applications on Google Play and the Apple App Store that exhibit predatory behavior such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment. These apps, which were found in Southeast Asian and African countries, as well as India, Colombia, and Mexico, purportedly offer quick, fully-digital loan approvals with reasonable loan terms.

Fix common cloud security risks with the Datadog Security Labs Ruleset

With the continual increase of attacks, vulnerabilities, and misconfigurations, today’s security organizations face an uphill battle in securing their cloud environments. These risks often materialize into unaddressed alerts, incidents, and findings in their security products. However, part of the issue is that many security teams are often stretched too thin and overburdened by alert fatigue.