Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Today's Top Risk Management Frameworks

Business environments change every day. That’s why using a risk management framework is a crucial part of any organization. It helps manage different kinds of threats you face day in, day out. Organizations with robust RMFs are better prepared to thrive and adapt in this unpredictable world, ensuring their continued success and resilience. This article introduces risk management frameworks and explains the significance of using one in your organization.

Smarter Digital Payment Monitoring in 2023

In bustling metropolises and rural communities alike, changes in the world of payments are forcing businesses to move at the speed of light. Whether you operate your business from a towering skyscraper or a busy village market, you must deal with dynamic evolutions in digital payments. From instant payments to super apps to embedded finance, businesses are embracing new ways to separate consumers from their money safely.

Managing Storage Access: Secure Cloud-native Development Series

Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the third part of the series, and it will teach you how to secure cloud storage and handle access controls on S3 buckets. Each cloud provider has managed storage services that your organization is already probably utilizing.

SocketSleuth: Improving security testing for WebSocket applications

Today, we are proud to announce the beta version of SocketSleuth, our new Burp Suite extension for performing security testing against WebSocket-based applications. SocketSleuth was created out of our security research group to aid in our security research against applications that leverage WebSockets for communication.

More than 1 Million Callaway Customers at Risk From Security Vulnerability

Topgolf Callaway is a powerful golf company that offers modern golfing entertainment, as well as selling golf equipment in most areas of the world. The organization maintains online and in-person stores in many different countries and sells to millions of customers annually. With so much customer data exchanging hands through this company and its many retailers, everyone involved is at risk because of a recent security vulnerability.

Cybersecurity Secrets: How AI Keeps Us Safe

Hey there! Today, we're diving into the exciting world of cybersecurity and AI! 🚀 We're on a mission to find out how we can catch those sneaky digital bad guys. We did some cool research and found out that the reason people are going all-in on AI and machine learning is pretty interesting. It's because there aren't enough super-smart folks to do the job the old-fashioned way!

The 443 Podcast - Episode 258 - The Qakbot Takedown

This week on the podcast, we cover the FBI-lead, multinational takedown of the Qakbot botnet of over 700,000 victim devices. After that, we cover two android malware variants including one targeting victims in southeast Asia and another built by the Russian GRU. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Arctic Wolf Managed Security Awareness: The Mission

Arctic Wolf Managed Security Awareness® prepares your employees to recognize and neutralize social engineering attacks and human error—helping to end cyber risk at your organization. Fresh. Original. Effective. That is the content you can expect to see through Arctic Wolf Managed Security Awareness®.

Random but Memorable - Episode 11.3: Teach Bot Cybersecurity Recipes with Clint Bodungen

Can ChatGPT help us unlock new cyber skills? 🔓🤖 Tune in to find out, as we sit down with Clint Bodungen, author of the upcoming book: ChatGPT for Cybersecurity CookBook: Learn practical generative AI recipes to supercharge your cyber skills. On today's show, we discover how to harness AI and large language models for good, in order to release our full potential in real-world cybersecurity. 🦸‍♀️💥

Are You Protected from the 12 Most Exploited Vulnerabilities?

One of the most vital things to get right in application security is dependency management, and to achieve this, your suite of AppSec tools must be up to date. This means that your vulnerability scanning, detection, and remediation capabilities must be able to identify and address the newest and most exploited vulnerabilities. Do you know what these vulnerabilities are? Have you got them covered? With the help of some of the world’s leading cybersecurity authorities, you can be.