Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Friday Flows episode 36: Using Tines Workbench for asset and vulnerability management

Michael Tolan from Tines Labs returns with Cameron for another episode on Tines Workbench. In case you missed it, Workbench is a Tines-powered AI chat interface where you can take action and access proprietary data in real-time, privately and securely. This episode leverages Workbench to make a tedious process extremely simple to handle. For any teams spending a lot of time on asset and vulnerability management, this is a must-watch!

Friday Flows Episode 33: From traditional SOAR to Tines automation, an engineer's perspective

Part 2 of Cameron's conversation with solutions engineer and experienced SOAR engineer Sif Baksh features a quick walkthrough of a simple but powerful workflow. This is a really interesting use of Tines Pages & Resources to simplify an impactful security use case. It also leverages GitHub and Cobalt Strike.

CurrentWare's Security Software is Eligible for FCC's Cybersecurity Pilot Program

See how CurrentWare ensures student safety in our web filtering software for schools case study Safeguarding sensitive information is crucial for educational institutions and libraries. The FCC’s Schools and Libraries Cybersecurity Pilot Program aims to bolster the cybersecurity infrastructure of these institutions by providing essential funding for robust security solutions.

What are SMB Ports, Port 139 and Port 445?

Organizations are increasing their use of various solutions to address communication needs across their infrastructure. As file systems are an integral part of collaboration, this article will dive into one of the most widely used protocols necessary for many systems. We will learn more about the SMB protocol, Port 139, Port 445, how it works, the risks associated with it, and remediation steps to provide a more secure communication channel.

What DNS over HTTPS (DoH) Is and How to Enable in Windows 10

DNS (Domain Name System) is a key component of the Internet infrastructure. DNS functions as a distributed directory service that translates human-readable domain names into machine-readable IP addresses. When you type a website address into your browser, the DNS system helps your browser find the right server on the internet. DNS uses a hierarchical and distributed database to manage the mapping of domain names to IP addresses.

Multiple Vulnerabilities Disclosed in Linux-based CUPS Printing Service

On September 26, 2024, a security researcher disclosed several vulnerabilities affecting Common UNIX Printing System (CUPS) within GNU/Linux distributions. CUPS is an open-source printing system that allows Unix-like operating systems, including Linux and MacOS, to manage printers and print jobs across local and networked environments. The newly identified CUPS vulnerabilities identified are.

Emerging Security Issue: Progress Software WhatsUp Gold (CVE-2024-6670)

CVE-2024-6670 is a critical (CVSS v3 score: 9.8) SQL injection vulnerability. Threat researcher Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) discovered that, if the application is configured with only one user, unauthenticated attackers can leverage this vulnerability to retrieve users’ encrypted passwords.

A Maturity Model to Secure Mulesoft Environments

In today’s rapidly evolving digital landscape, where application programming interfaces (APIs) are becoming the backbone of technology infrastructure, the need for robust management and security measures have never been more critical. With the surge in API use and the corresponding increase in threats, protecting Mulesoft environments has become a top priority.

How Mergers & Acquisitions Are Leaving Your APIs Vulnerable #apiattacks #apimanagement #api

Mergers and acquisitions can expose critical API vulnerabilities, often overlooked due to poor documentation and lack of standardization. Learn about the hidden risks that can lead to delayed incident response and compromised security during M&A processes.