Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A Developer's Tutorial to Using NPM Audit for Dependency Scanning

Many developers overlook the risks lurking in third-party packages. Every package you add could harbor vulnerabilities, potentially exposing sensitive user data and granting unauthorized access to your systems. It can lead to severe consequences, including data breaches, system compromises, reputation damage, and disruption of your services. With 80% of projects using at least one vulnerable package – it’s a crucial issue.

REPLAY: Revisiting Play Ransomware Anti-Analysis Techniques

The Play ransomware, also known as PlayCrypt, is a ransomware that first emerged in June 2022. The ransomware has been targeting industries such as healthcare and telecommunication as well as a wide range of regions such as Latin America, Europe, and North America. The Play ransomware is known for gaining access to networks through compromised valid accounts or by exploiting specific vulnerabilities. Once inside the network, it uses a big pool of known post-exploitation tools to continue its attack.

Over $40 Million Recovered and Arrests Made Within Days After Firm Discovers Business Email Compromise Scam

According to the FBI, billions of dollars have been lost through Business Email Compromise (BEC) attacks in recent years, so you may well think that there is little in the way of good news. However, it has been revealed this week that police managed to recover more than US $40 million snatched in a recent BEC heist just two days after being told about it.

A security expert's view on Gartner's generative AI insights - Part 2

Welcome to the second part of our two-part special on Gartner’s “4 Ways Generative AI Will Impact CISOs and Their Teams” report! If you’ve missed the first part on model composition, you can read it here. Today, we will explore why security specialism matters in an AI security tool, particularly where AI quality is concerned.

Stories from the SOC - Sowing the Seeds of Cybercrime: The Credential Harvester

Cyber attackers are constantly innovating new ways to compromise users and steal credentials. Among these techniques, credential harvesting through phishing attempts is one of the most prevalent methods. This deceptive strategy often involves attackers creating a fake site that mirrors a legitimate login page.

Impersonate a Client After Authentication Configuration in Windows

The Impersonate a client after authentication Windows security setting allows a program or service to act on behalf of a user after the user has logged in. This is essential to the running of many applications, from printing and accessing user files in web applications, to the systems service control manager. This ability to temporarily act as another user is also known as impersonation and the application must have the correct security configuration in order to do so.

Rubrik Named Five Times A Leader and Five Times Furthest in Vision: We Believe a Testament to Cyber Resilience

I am proud to announce that Rubrik has been recognized as a leader not just once but five consecutive times – we believe this is a testament to our vision and commitment to cyber resilience. This recognition in the Gartner Magic Quadrant for Enterprise Backup and Recovery Solutions (EBRSS)1 is a significant milestone for us, and it reaffirms our dedication to empowering organizations to navigate the complexities of data security and protect against evolving cyber threats.

Updated SafeBreach Coverage for US CERT Alert AA23-061A - BlackSuit (Royal) Ransomware

On August 7th, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) issued an update to an existing advisory (AA23-061A) highlighting new TTPs being leveraged by the recently rebranded “Royal” ransomware gang – now known as BlackSuit. Detailed information about this threat and the associated IOCs and TTPs can be seen on #StopRansomware: Blacksuit (Royal) Ransomware.

Creating a Secure Community of Interest (COI) for Defence & Industry Information Exchange

The secure exchange of information between the Government, Defence and the supply chain is critical to operational outcomes. A Community of Interest (COI) is often used to facilitate multi-party coordination and collaboration between these parties but is often difficult to implement. Let’s explore the use cases, challenges and tools for creating COIs for secure information exchange.