Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Immutable Ledgers: Recording Time-Sensitive Decisions and Knowledge

In a time when everything said, whether factual, fake, or AI-created, may be recorded and posted on the internet, it’s more important than ever to ensure that what was recorded accurately represents a point in time. When someone claims you said, “I was Smoking on a flight, watching Star Wars, the best special effects movie of all time,” was that a false claim? Did they include the date and the context?

North Korean Hackers Target Software Developers With Phony Coding Tests

Researchers at ReversingLabs warn that North Korea’s Lazarus Group is targeting software developers with phony job interviews. The threat actors are posing as employees of major financial services firms and send coding assessment tests as part of the interview process. Our team recently recorded a webinar that covers this exact topic, as our cybersecurity experts discuss how we spotted the red flags and stopped it before any damage was done.

SANS Releases Guide to Address Rise in Attacks on Manufacturing and Industrial Control Systems

Increased ransomware attacks on industrial control systems (ICS), mixed with general ICS insecurity found across the manufacturing sector, has given rise to a guide specifically addressing this risk. Manufacturing has been a target of ransomware for quite some time — I’ve even covered a recent attack focused on credential harvesting.

Active Roles release 8.2: Enhancements for hybrid cloud and Entra ID

You may already be using Active Roles to manage privileged access, identity and Active Directory (AD) from a single pane of glass. But now, you can get more. Active Roles release 8.2 is poised to offer multiple new features that support customers who are migrating to the cloud and applying web-based resources during the continuing market evolution. It also introduces enhancements to management within Entra ID.

Detect and Defend: 5 Tips for Guarding Against Insider Threats

Not every cybersecurity threat originates outside of the organization. External threats tend to receive more attention, but an IBM report shows that a breach caused by an insider threat can carry an even higher cost. In fact, malicious insider attacks cost an average of $4.99 million despite accounting for just 7% of breaches. That makes them the most expensive breach vector in the report.

5 Zero Trust Remote Access Solutions Your IT Team Needs to Know

In the past, organizations could control how, when, and where their employees accessed sensitive data. Now, in the age of hybrid and remote work, employees can connect to company networks from any location over nearly any device. Safeguarding data while granting employees the access they need is a delicate balance. That’s where zero trust remote access solutions come into play.

CISA KEV performance in the Financial Sector

As a security data nerd I am absolutely spoiled here at Bitsight. So much so that I have to stop myself from doing little projects and requests so I can dive into the “big” stuff1. So it is always refreshing when folks see a piece of research and decide “hey can you give me more information on my little corner of the world.” Then of course and can throw off those notions of “stopping” and just dive back in.

Securing Digital Health: Cybersecurity Challenges in Rapid Healthcare Transformation #shorts

The healthcare industry, traditionally slow in digital transformation due to stringent regulations, is now experiencing rapid change. As digitization accelerates, vast amounts of personal and professional data are being stored across healthcare systems—making them prime targets for cybercriminals. This sector’s rich data environment, coupled with evolving cybersecurity practices, creates a unique challenge. Unlike the well-established security measures in banking and financial services, healthcare's cyber defenses are still maturing.

Introducing Netacea Threat Intel Feeds

This webinar introduces Netacea Threat Intel Feeds—a tool to harden your defenses against automated attacks using real-world threat data. Join James Middleton, Andy Still, and Cyril Noel-Tagoe as they explore how Netacea processes trillions of requests daily, enabling Threat Intel Feeds to identify and stop attack traffic in real-time, so you can squeeze more value out of your existing edge defenses.

Cato CTRL Threat Research: CVE-2023-49559 - gqlparser Directive Overload DoS Vulnerability

The Cato CTRL and Cato Application Security Research teams recently discovered CVE-2023-49559, a directive overload Denial of Service (DoS) vulnerability in the gqlparser library, which is a crucial component in the development and running of GraphQL applications. The vulnerability is of medium severity (CVSS score of 5.3). The gqlparser library is an integrated component of the gqlgen Golang GraphQL server, widely used in web applications to handle GraphQL queries.