Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)

CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw. Its primary danger comes from the potential for providing unauthorized network access, both allowing attackers unfettered access to critical resources and, in some cases, giving attackers the ability to crash the firewall.

Zero Trust + AI: fewer alerts, guaranteed security

Excessive cybersecurity alerts are not a trivial matter; they pose a real challenge that directly impacts business security strategies. Too many notifications generate stress on IT teams, which are increasingly being reduced in size while facing a heavier burden of tasks. This situation can lead to urgent alerts being overlooked, putting system security at risk.

Enhancing CISO-Board communication: Three key questions for the CISO to answer

A challenging dynamic exists between the CISO and the Board of Directors. While both stakeholders focus on risk management, their approaches to risk and the language they use are notably different. Though regulations like the NIS2 directive and SEC cybersecurity disclosure rules have given CISOs a bigger seat at the table, the legal requirements and operational prioritization to meet them have exposed a difference in perspective and understanding between the two roles.

The Invisible Risk of Mobile Apps: PWA Fraud and How to Prevent It

Almost a decade after their emergence, Progressive Web Apps (PWAs) finally went mainstream in 2024. Their MO? To compete with, and in some cases replace native apps. To do this, PWAs promise to combine the best features of web and native mobile apps, delivering seamless, reliable, and engaging experiences across all devices and platforms. Cross-platform compatibility, direct distribution, cost and maintenance advantages – it all sounds very alluring.

Announcing four new administrator controls for 1Password Business

Balancing robust security with user-friendly access is no small feat. As security professionals, you’ve shared the challenges you face—managing security across a diverse workforce, visibility into security issues, streamlining onboarding and offboarding processes, and ensuring compliance with regulatory requirements. And we’ve listened.

Navigating the Digital Landscape: Local Proxies Tailored to Your Needs

In today's digital age, where data is currency and online activities shape businesses and individuals alike, the importance of proxies cannot be overstated. Whether you're a data analyst, a digital marketer, or an online enthusiast, you've likely encountered situations where unrestricted access to the internet becomes a necessity. This is where local proxies come into play, offering tailored solutions to meet diverse online needs with custom packages.

5 best practices for executive reporting

In today's complex business landscape, effective executive reporting is not just about sharing information; it's about using the insights to take action and demonstrating the value of your compliance and security efforts. This blog outlines five essential practices to help you refine your reporting skills and ensure your insights resonate with key stakeholders and support informed decision-making. ‍

Billington 2024: Key Cybersecurity Takeaways from the AI Age

SecurityScorecard had the pleasure of participating in the 15th Annual Billington CyberSecurity Conference – a key convening of policymakers and industry thought leaders in our Nation’s Capital. This year’s edition – Advancing Cybersecurity in the AI Age – included over 4,000 registrants and 200 speakers participating in 40+ sessions and breakouts. It would not be an emerging tech and government conference without an extra emphasis on AI.

Exploring an Experimental Windows Kernel Rootkit in Rust

Around two years ago, memN0ps took the initiative to create one of the first publicly available rootkit proof of concepts (PoCs) in Rust as an experimental project, while learning a new programming language. It still lacks many features, which are relatively easy to add once the concept is understood, but it was developed within a month, at a part-time capacity.

5 reasons why developers at FinServ institutions are outpacing their security teammates

Advanced biometrics. Seamless onboarding walkthroughs. Cross-platform integrations. Hyper-personalized dashboards. Cleanly designed reports. These are just some of the features today’s users expect from their financial applications, pushing most financial institutions to release them quickly — or risk being outpaced by FinTech disruptors who already do. As a result, development teams must build more quickly, adopting new technologies to stay in step with demanding goals and tight deadlines.