Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Tokenised Auth

Authentication can sound simple. It's just a login form and a couple of database columns, right? Why would you need a separate identity platform to solve this? You've probably heard that you shouldn't roll your own crypto, or payments. Well, add authentication to that list. Ben Dechrai joins us to discuss the aspects of good authentication, from tokenisation to multi-factor, and dives into a few features of Auth0 that help you customise, extend, and personalise your users' experience.

Weekly Cyber Security News 17/09/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Cryptocurrencies are never far from the news, and with El Salvador making it an official currency many are jumping at the slightest news of an uptick in respectability. That thirst has not gone unnoticed and a fantastic coup played out in the last week.

New Trends With Ransomware - Fall 2021

Ransomware has become an annual event for many organizations, costing them millions in lost productivity and revenue. While there have been some notable successes in fighting off this threat, the industry as a whole must continue strengthening its resolve in order to safeguard against future attacks. Part of this can come down to recognizing the role that users and employees play in fighting off these attacks and providing them with info and tools they need to help reduce risks.

How Devo Helps Our Customers Solve Pressing Cybersecurity Challenges

For the past 10-plus years, cybersecurity solutions have been innovating rapidly to thwart new threats. But as they solved security challenges, new ones constantly emerged — especially as organizations continue to expedite their digital transformation efforts and shift to the cloud.

How to protect yourself from APTs to avoid incidents like the Microsoft Exchange case

APTs (Advanced Persistent Threat) have more serious consequences than conventional cyberattacks. The explanation for this lies in the fact that, on the one hand, the perpetrators spend much more time and effort (often promoted by government organizations), and on the other, the victims are also more high profile.

Hunting for Malicious PowerShell using Script Block Logging

The Splunk Threat Research Team recently evaluated ways to generate security content using native Windows event logging regarding PowerShell Script Block Logging to assist enterprise defenders in finding malicious PowerShell scripts. This method provides greater depth of visibility as it provides the raw (entire) PowerShell script output. There are three sources that may enhance any defender's perspective: module, script block and transcript logging.

Apple's Vulnerability

Apple has issued an emergency software update after a cyber-surveillance company created invasive spyware that could infect any iPhone, iPad, Apple Watch, or Mac Computer. Toronto-based internet watchdog security group Citizen Lab said that NSO, the surveillance company which is an Israeli spyware company, developed the tool with a technique that could easily exploit Apple software.