Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The journey to AppSec gold: Lessons we can learn from the Olympians

The 2024 Olympics are in full swing, and everyone at Snyk is excited to tune into the games and cheer on our respective countries’ athletes. There’s a lot to love about the Olympics — dazzling opening ceremonies, heart-racing feats, close-call victories, and so much more. But along with all the fun and excitement comes a sense of inspiration.

Zero Standing Privileges: The Essentials

In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with CyberArk Product Marketing, I’ve advocated for zero standing privileges (ZSP) as a default mechanism for implementing privilege controls. It’s easier, more effective and doesn’t change how people work.

API Attacks: Understanding Malicious and Malformed Threats

This video dives into two critical categories of API attacks: malicious intentions and malformed API threats. Learn why these dangers are becoming increasingly significant for modern companies and how API security can help prevent major incidents. Experts from GigaOm and Wallarm discuss how to identify and mitigate these vulnerabilities to ensure the safety of your data.

Cato CTRL Threat Brief: CVE-2024-38077 - Windows Remote Desktop Licensing Service RCE Vulnerability ("MadLicense")

Recently, CrowSec security researchers published a proof of concept (PoC) for a critical remote code execution (RCE) vulnerability in Windows Server (CVSS score 9.8), ranging all the way from Windows Server 2000 up to 2025. The vulnerable component is the Remote Desktop Licensing service, often deployed and enabled on Windows Servers using Remote Desktop Services. The exploit is a 0-click pre-auth exploitation, meaning no user interaction or authentication details are necessary.

Understanding Context-based requests for SAP in Identity Manager

Context is important. And there is no exception when traversing the realm of cybersecurity, especially when dealing with Roles within SAP ABAP systems. In Identity Manager, Context-based requests come up frequently enough to require well-organized, air-tight configuration. But what exactly are you configuring? And is it going to be hard to follow this road? What is Context in SAP roles? Organizations, especially large organizations utilizing SAP, will have lots of SAP roles to sort through.

Supply Chain Visibility: The Key to NIS2 Coordinated Risk Assessments

The path to NIS2 compliance is less about ticking boxes and more about fostering a resilient, proactive cybersecurity culture across the organisation and its extended network. While the challenges pertaining to third-party and supply chain risk management are significant, they are not insurmountable—especially if we break them down. Today we will focus on understanding a very specific NIS2 requirement: Coordinated Risk Assessments.

What is response rate limiting? How does it help in securing your critical network infrastructure?

Organizations often face different forms of cyberthreats and cyberattacks, and attackers try to get their hands on confidential data which would result in major loss of reputation, customer’s information, etc. So, organizations should implement networking tools to secure their data.

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

The GSM Association, which stands for the Global System for Mobile Communications Association and is known more commonly as the GSMA, developed the Security Accreditation Scheme (SAS), a security standard and audit-based certification program that addresses various aspects of eSIM production and management. ManageEngine Firewall Analyzer now supports GSMA compliance for mobile operators and companies within the mobile ecosystem.