Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dark Overlord collaborator imprisoned for trading stolen identities

A Canadian man has been handed a three year prison sentence after being found guilty of buying and selling over 1700 stolen identities on a dark web marketplace. 29-year-old Slava Dmitriev, who went by the online handle of “GoldenAce”, bought and sold individuals’ personal private information, including social security numbers, on the AlphaBay dark web marketplace in 2016 and 2017.

How to Perform HIPAA Risk Assessment

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires healthcare entities to implement policies and procedures to safeguard the privacy and security of the protected health information (PHI) of patients. One core requirement is to perform risk assessments. This article explains what a risk assessment is according to HIPAA and offers guidance about the steps involved.

Will digitalization turn to be a catch-22 for cybersecurity in 2022?

As organizations became increasingly interconnected globally, every business started adapting to the digital model for all their transactions, fearing that otherwise they would be left behind in the race. Unfortunately, this has turned out to be a catch-22 as threats to cybersecurity are continually increasing. The rise in attacks was partly due to Log4j that helped to boost the cyberattack attempts to an all-time high in Q4 2021.

Threat Advisory: STRT-TA02 - Destructive Software

The Splunk Threat Research Team is monitoring open channel intelligence and government alerts indicating the possibility of malicious campaigns using destructive software in relation to ongoing geopolitical events. Based on historical data of named geopolitical actors, the use of destructive payloads has been observed in past campaigns.

Validation Requirements to Get an Individual Code Signing Certificate Issued

Like a loner wolf, are you among those software developers who work independently instead of being part of a company or an organization? If yes, you may have one major issue of not being recognized as any significant brand name for the software you develop. You may even have a headache of getting trusted by browsers and operating systems and bypassing ugly warning messages like an unknown publisher.

How to Setup Your EV Code Signing Certificate [An Easy Guide]

The collection process of an EV Code Signing certificate is quite different compared to the OV (Organization Validated) Code Signing certificate. But it also offers additional security practices that aren’t provided by a standard code signing certificate. Nonetheless, here in this piece of article, we’ll discuss how to setup your EV Code Signing certificate so you can move further with digitally signing your applications and software.

CMMC Town Hall With Tom Tollerton, Dixon Hughes Goodman LLP | 1/26/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

4 Data Governance Best Practices

Data governance is the principled approach to managing data during its life cycle — from the moment you generate or collect data to its disposal. Good data governance ensures that data is kept private, accurate, usable, and most of all: secure. Data governance is a broad term, and as a result, good data governance encompasses everything from user behavior to technology to policies and compliance regulations.

Pentest 101: SQL Injection | What is SQLi? | How to Avoid It?

SQL injection is listed in both OWASP top 10 vulnerabilities and top 25 vulnerabilities by SANS. An attacker can hijack your database, delete critical information, or create a persistent backdoor by exploiting an SQL injection. 😰 You need penetration testing to detect and fix this critical vulnerability. Astra Security presents a crisp exploration of SQL injections - how they occur, how they affect a user, different categories of SQLi vulnerabilities, and the way in which you can avoid them.

Outpost24 Webinar - API security 101 and how to secure your web applications

APIs are a key part of modern web applications and a growing security challenge that isn’t well understood by developers and application security managers, leading to exposed APIs that give hackers access to sensitive data. Find out how to secure your APIs and prevent vulnerabilities from making it into production.