Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Internet Safety for Kids: How to Keep Your Children Safe Online

The world wide web is a wild and dangerous place. There’s a lot of inappropriate content and, worse, persons who may have ill intentions toward your children. So, as a vigilant parent or guardian, how can you ensure the safety of your kids in this digital wilderness? Look no further than the solution to download fast VPN for Android or iOS onto their devices. By taking this proactive step, you equip your children with a powerful tool that can make a world of difference.

CleanINTERNET Protects Customers from MOVEit Vulnerability

In early June, multiple threat researchers observed attacks on MOVEit servers using a zero day vulnerability that facilitated data exfiltration. MOVEit Transfer is a managed file transfer software that supports the exchange of files and data. This vulnerability allows an attacker to gain access to the database and possibly infer information about the structure and contents of the database.

The 443 Podcast - Episode 246 - Minecraft Mod Malware

This week on the podcast we cover a supply chain attack of sorts against Minecraft gamers. After that, we cover a vulnerability in MOVEit Transfer that threat actors are exploiting in the wild to steal data and deploy ransomware. Finally, we wne with our review of the latest Verizon Data Breach Investigations Report (DBIR).

Elastic's detection rules are still open for business - plus further visibility to data quality

Given the increasing frequency, tempo, and sophistication of cyber attacks, it's more important than ever that organizations take a proactive approach to protecting their sensitive data and assets. One of the most critical elements of effective cybersecurity is openness. An open approach to cybersecurity means being transparent, sharing knowledge, and collaborating to build more robust defenses against threats.

RCA Series: Root Cause Analysis Overview

Root cause analysis plays an important role in web applications, IT operations, security, and industrial OT. This video series explains general approaches to root cause analysis and how Elastic accelerates the process with visualizations and dashboards, machine learning to detect anomalies and classify conditions, and interactive tools that empower analysts to drill into additional information that lead to root cause of potential system issues and security incidents.

Lessons Learned Deploying Corelight in the Black Hat Asia NOC

Last month, Corelight had the distinct privilege of joining Cisco, NetWitness, Palo Alto Networks, Arista, and our internet service provider, MyRepublic, to provide availability and network security overwatch to the Black Hat Asia network in Singapore. This marked our first appearance in the Black Hat Network Operations Center (NOC).

How to Keep Your Data Safe Online

There are risks associated with providing your confidential information online, but it’s necessary in a modern world that requires Personally Identifiable Information (PII) to create accounts, purchase goods online, complete your taxes or receive a paycheck. Your data could become vulnerable through no fault of your own. Data breaches are common, and your account information could get leaked. If your data is intercepted by threat actors, it could be sold to cybercriminals on the dark web.