Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the RSA-based Marvin Attack

The Marvin Attack, named after the vulnerability it exploits, poses a significant threat to systems relying on RSA encryption and signing operations. It's a variation of the Bleichenbacher attack, which exploits errors in PKCS #1 v1.5 padding to perform adaptive-chosen ciphertext attacks. The attack leverages timing information obtained from RSA encryption or signing operations.

The Future of Kubernetes Network Policy

In the ever-changing world of Kubernetes security, it’s crucial to stay ahead of threats while maintaining operational efficiency. That’s why we’re excited to introduce our latest feature: Auto-Generated Kubernetes Network Policy, based on application runtime behavior, powered by eBPF (extended Berkeley Packet Filter) technology. With this addition, organizations can easily apply native Kubernetes network rules without worrying about disrupting their production systems.

Calculating the ROI of Effective Bot Management

Bots cost the average business 4.3% of online revenues every year – or $85 million for the typical enterprise – so it’s critical that businesses invest in finding the right bot protection solution. If you’re coming up against resistance within your business when seeking to procure or upgrade your bot protection capabilities, this post will give you plenty of ideas for proving why better bot management is essential – in ways that matter to everyone in your organization.

What Are The Risks of a Quantum Apocalypse, and Should We Worry?

Apocalypse now? Later? Will it ever happen? Computers can solve many problems in our day-to-day lives, making working remotely, storing files, and connecting with people from across the globe significantly easier. But has the development of computing technology gone too far? The potential of quantum computers may lead to technical breakthroughs in machine learning, science, and healthcare, but these powers may come at a cost. Current computer systems are far less powerful than quantum computers.

Locking Up LockBit - The 443 Podcast, Ep. 281

🔒 🔴 This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover an international law enforcement takedown of the LokBit #ransomware group’s infrastructure. After that, they cover a novel #malware delivery vector involving an IoT “toy.” Marc and Corey end the podcast by covering the latest White House Executive Order addressing #cybersecurity in critical infrastructure.

Netskope Cloud Exchange for Your Zero Trust Journey

Early in 2023 my colleague, and VP of Technology Integrations and Business Development, David Willis walked us through Realizing the True Power of Netskope Cloud Exchange. In the article, David painted the evolution of Cloud Exchange with a focus on how the Netskope Cloud Threat Exchange (CTE) module has matured since it was released.