Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

All About That 8Base Ransomware Group: The Details

First Publishied Nov 6th 2023 Updated May 9th 2024 Last seen on this month, 8Base is a ransomware collective that initiated its operations in April 2022. Despite its relatively short time in the cyber landscape, the group has swiftly garnered a reputation for its forceful strategies and the substantial volume of victims it has affected.

Agent Impact on Endpoints - Tanium Agent FAQs - Tanium Tech Talks #88

Often we get the question, “What is the impact of the Tanium agent on the endpoint?” Today we’re going to unpack that answer as part of a series on optimizing the Tanium agent for your environment. In this series we’re going to explore expectations for endpoint agent load, look at agent tuning, talk about proper anti-virus exclusions, what to consider for virtual infrastructure, and more. Today we’re going to focus on the baseline load of the Tanium agent on your endpoints: disk, memory, CPU, network.

Virtual Endpoints (VDI & VMs) - Tanium Agent FAQs - Tanium Tech Talks #90

How do I tune Tanium for virtual infrastructure like VMs and VDI? Many folks who have worked in IT ops are familiar with the struggle of keeping virtual infrastructure properly resourced with memory, disk, CPU, and network. Sometimes it’s a balancing act of hardware, budget, and virtual machines. Now you’re deploying a real time agent on every guest on those virtual hosts, so how can we make sure it doesn’t create a resource storm?

Third Party Exclusions - Tanium Agent FAQs - Tanium Tech Talks #89

My endpoints have other agents beside Tanium. How do I get them to play well together? The onboarding checklist for every new Tanium customer includes a step on third party agent exclusions. Most IT shops have anywhere from 5 to 15 agents running on their servers and workstations, everything from antivirus to data loss prevention. So how can we make sure that Tanium functions well alongside those other agents? This is the next installment in our Tanium Agent FAQ series.

Verizon Data Breach Investigations Report 2024 Review

As with every year, the Verizon DBIR is released, with data involving more than 10,000 breaches that have been dissected and used to create the report’s baseline. Cyberint’s Research team inspected the document to understand where the cyber security realm is heading, the important trends in data breaches and incidents, and what we need to look for moving forward in 2024.

AI Awareness Gap: Bridging the Disconnect Between Tech Experts and the Public | Razorthorn Security

Amy Stokes-Waters sheds light on the disconnect between technology enthusiasts and the general public's interest in tech, specifically AI advancements. In this engaging clip, Amy discusses the challenge of communicating complex tech concepts, like AI-generated content, to those outside the IT sphere. She emphasizes the need for better education on technologies that are reshaping our media landscape. Dive into this discussion to understand why simplifying tech talk is essential for broader awareness and acceptance.

Unrealistic Cybersecurity Job Expectations: The Talent Gap Issue | Razorthorn Security

Amy Stokes-Waters critiques the unrealistic expectations in cybersecurity job descriptions, highlighting a significant industry challenge. Discover why demanding expertise in both SOC operations and pen testing for a single role, with insufficient compensation, exacerbates the talent gap. This clip exposes the harsh realities of the cybersecurity job market and the need for more realistic hiring practices to attract and retain skilled professionals.

How to Use Git Secrets for Better Code Security

You know that sinking feeling after you hit “commit”? That moment when you suddenly wonder, “Wait, did I just accidentally expose an API key or hardcode a password?” We’ve all been there, and the risks are no joke. But here’s the good news—there’s a way to ditch that anxiety for good. In 2023, GitHub’s automated scanning blocked over 12.8 million leaked secrets. Code leaks are every developer’s worst nightmare.