Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

KeePass CVE-2023-32784: Detection of Processes Memory Dump

During May, a new vulnerability CVE-2023-32784 was discovered that affected KeePass. KeePass is a popular open source password manager which runs on Windows, Mac, or Linux. The vulnerability allows the extraction of the master key in cleartext from the memory of the process that was running. The master key will allow an attacker to access all the stored credentials. We strongly recommend updating to KeePass 2.54 to fix the vulnerability.

Understanding the Anatomy of a Malicious Package Attack

To identify malicious packages and protect yourself against them, you need to know what to look for. Here’s a simple guide. In January 2022, users of the popular open-source libraries “faker” and “colors” suddenly found their applications started to malfunction and display nonsensical data because they had been infected by a malicious package.

Mastering Attack Surface Discovery: A Power Tool for Security Operations Pros

As security teams witness that their organization’s digital footprint keeps growing in size and complexity, the urgent need for attack surface discovery becomes clear. But what exactly does attack surface discovery entail, and why is it so crucial in today’s digital landscape? This blog post aims to demystify attack surface discovery and provide insights into its importance for security operations teams.

AI Biases: Why Achieving Beneficial AI is Challenging

In this video, we delve into the complex issue of AI biases and the challenges they pose in creating a truly beneficial AI system. Join us as we explore the diverse perspectives surrounding the selection of biases in AI models, which often results in different representative AIs even within the same country. We discuss how individuals seek to have their own biases reflected in the AI models they use, or criticize them for perceived biases, highlighting the irony in contrasting approaches between countries like China and other nations. Moreover, we shed light on the elusive quest for objective determination of what's best for the majority, emphasizing the absence of a universally accepted method.

Advancing the Cyber Community & 'The Last Person' Principle

Discover the power of giving back and strengthening your cyber security expertise in this masterclass. Part 1 explores ways to contribute and foster collaboration within the security community. Gain insights into the field's strengths, identify areas for improvement, and unify and strengthen our discipline. In part 2, learn about the advanced security concept, the "last person principle" to proactively mitigate risks and fortify your security strategy.

Cyber Threats and Opportunities: What Channel Partners Need to Know to Grow

The cybersecurity landscape is constantly evolving, and channel partners must stay ahead of the curve to successfully defend their customers and grow their businesses. The good news is, according to Canalys, the global cybersecurity market is expected to grow by 13% in 2023, providing channel partners with significant growth opportunities.

5 Tips For Selecting Your Source of Threat Intelligence Information

In today’s digital world, cybersecurity threats are on the rise, and businesses must stay vigilant to protect their sensitive data from cybercriminals. To combat these threats, companies often rely on cybersecurity information vendors to provide them with intelligence information. However, the quality of the intelligence information provided by these vendors has come under scrutiny, and there have been concerns about the accuracy and effectiveness of the information provided.

Rubrik Security Cloud - Government Is On the FedRAMP Marketplace

Here at Rubrik, we are rapidly progressing towards our initial FedRAMP® moderate authorization, and we are very excited to be listed as “In Process” on the FedRAMP Marketplace. This is an important milestone in delivering Rubrik’s data security platform to the U.S. federal government organizations.

GigaOm Names Keeper Enterprise Password Manager The Overall Leader

Keeper Security’s Enterprise Password Management (EPM) solution has been recognized as the Overall Leader in password management by the analyst firm GigaOm in their 2023 Radar Report for Password Management. GigaOm has named Keeper as the overall leader for two years in a row. This designation comes on the heels of similar recognition by G2, CHIP and the Global Infosec Awards, among others.

How Do Hackers Steal Passwords?

Hackers steal your passwords through a variety of methods including data breaches, password cracking, guessing, physical theft and malware. This can have serious consequences, especially if the hackers gain access to your accounts, but there are ways to protect yourself. Read on to learn more about how hackers steal passwords and how to prevent them from gaining access to your accounts.