Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SELinux, Dragons and Other Scary Things

If you've ever used Linux, you’ve probably heard about SELinux or Security-enhanced Linux. For a very long time, my interaction with it was just restricted to: Like many other security solutions, SELinux can sometimes be annoying, and understanding even the basic concepts can change our bigger enemy to our best friend.

A Quantum Arms Race in Cybersecurity

In 2001, NIST (the US National Institute of Standards and Technology) announced Advanced Encryption Standard (AES), a new encryption standard, designed to help organisations enhance protections against brute force attacks. The previous Data Encryption Standard (DES) had become vulnerable, with processing power growing, and the Electronic Frontier Foundation (EFF) had proved that DES encryption could be broken in less than 24 hours, therefore a new encryption standard was required.

WatchGuard Cybersecurity Predictions Challenge 2023

In 2023, WatchGuard predicts that hackers will try to bypass your cybersecurity defenses using new techniques focused on business processes, identity, and artificial intelligence. This year, Corey and Marc square-off in a Predictions Challenge, offering different takes on potential hacks and attacks in these categories. Whose predictions will come true…only time will tell!

The 443 Episode 221 - Apple's New Privacy Expansion

This week on the podcast, we cover Apple's latest announcement of expanded privacy and security features for their users. Before that, we cover a major breach in the Android ecosystem followed by a new Internet Explorer (yes, that still exists) 0-day vulnerability. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Threat Actors use Google Ads to Deploy VIDAR Stealer

Kroll has observed threat actors abusing Google Ads to deploy malware masquerading as legitimate downloads or software that has been “cracked” or modified to remove or disable features such as copy protection or adware. As part of our analysis of this trend and threat, we have identified specifically that VIDAR malware, an information-stealing trojan, is using Google Ads to advertise spoofed domains and redirect users to fraudulent sites or malware downloads.

How to Deploy Egnyte's Project Templates in 3 Simple Steps to Save Time on Project Set-up

‍ If you're an architect, builder, or engineer, you know that one of the most time-consuming parts of starting a new project is setting up the permissions for each subfolder. You must set the permissions for the same folders over and over again for every new project, which can really start to eat into your billable hours. Fortunately, there's a way to save yourself some time by using project templates.

Gaming Industry: The Need For CyberSecurity (Protocols)

Gaming is the largest entertainment industry worldwide, with a market worth over $197 billion USD in 2022. The pandemic has caused an enormous 26% surge in growth in 2019 and 2021 as users attempted to break up the monotony of lockdowns and stay close to friends and family. This large and growing industry where cash and data are exchanged online is a draw for nefarious actors.

GitGuardian Playbooks Overview

GitGuardian Playbooks allow you to quickly and easily automate your incident responses. GitGuardian is proud to offer 3 different playbooks designed to get your team involved in remediating incidents: We would be happy to work with you to create custom playbooks as well. Don't hesitate to reach out to us at contact@gitguardian.com.

Introducing Third-Party Vulnerability Detection

Learn how Bitsight Third-Party Vulnerability Detection empowers third-party risk professionals to find and remediate threats - including major security events - more quickly within their vendor portfolio. Identify exposure and mitigate risk more easily with critical insights into the impact on your organization’s third parties.