Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Unlocking the Benefits of Rook vs. Ceph in Kubernetes and How CloudCasa Simplifies Storage Class Migration

Ask Our Experts In the rapidly evolving world of Kubernetes, managing storage efficiently can be a challenging task. As more organizations adopt Kubernetes for their cloud-native applications, the need for scalable, resilient, and automated storage solutions becomes critical. This is where Rook and Ceph come into play, offering powerful storage capabilities tailored for Kubernetes environments.

Software Liability Comes to the EU: Navigating New Compliance Challenges

The European Union has taken a significant step by introducing a directive to update the EU’s civil liability law that extends the definition of "defective products" to include software. These pivotal liability rules hold manufacturers accountable for harm caused by software vulnerabilities, urging them to prioritize cybersecurity and compliance. Here’s how manufactures should think about navigating these new compliance challenges.

Meeting Compliance With Threat Intelligence

Threat intelligence is the process of gathering, analysing, and applying information about current and potential cyber threats to help organisations protect themselves proactively. It involves monitoring threat actors, attack patterns, vulnerabilities, and global cyber activity to provide actionable insights. Unlike traditional reactive approaches to cyber security, threat intelligence enables businesses to anticipate threats and tailor their defences accordingly.

The Role of Pretexting in Cyber Attacks

A threat actor sends an email to a user at an organization claiming to be from the IT department. They need a password to a critical application, and the email is convincing – it mentions aspects of the application that would only be known to the user, it brings up a recent update email that was sent out company wide, and it even closes with a friendly, “Hope to see at next week’s happy hour!” in the sign-off.

Follow-Up: Critical Authentication Bypass Vulnerability in Palo Alto Networks Firewalls Actively Exploited (CVE-2024-0012)

On November 18, 2024, Palo Alto Networks (PAN) released updated information on an actively exploited vulnerability impacting PAN-OS, the operating system that powers PAN firewalls. Originally disclosed last week as a remote command execution vulnerability, this flaw has now been reclassified as an authentication bypass flaw and assigned CVE-2024-0012.

CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER)

IDATLOADER (aka HIJACKLOADER, GHOSTPULSE) has become prevalent in 2024, using advanced and new techniques such as BPL Sideloading, which Kroll reported on in June. Kroll observes IDATLOADER distributing malware such as ASYNCRAT, PURESTEALER, REMCOS, STEALC and what some might describe as a recent epidemic in LUMMASTEALER infections.

The Dark Side of Loyalty: Combating $1 Billion Frequent Flyer Mile Scams in the Airline Industry

Frequent flyer programs have long been a symbol of loyalty and reward in the airline industry. These programs are intended to reward travelers with benefits and encourage ongoing customer relationships. However, a growing and pervasive threat is lurking beneath the allure of free miles and exclusive perks: Frequent Flyer Miles fraud. At the last credible count in 2018, there were over 30 trillion unspent miles in circulation, according to McKinsey.

How our new engine framework helped address the critical CUPS vulnerability within the day

When a critical vulnerability in the printing system CUPS started raising alarms among security teams, Detectify had already entered war-room mode to address the situation. Within the day, customers could test whether they were vulnerable thanks to the rollout of a new scanning engine framework that reinvents how Detectify operates under the hood, allowing for a faster and more efficient response to security threats.

How to increase cyber resilience

Making your organization’s attack surface lean and agile improves your cyber resilience and demotivates bad actors. The first step to avoid cyber attacks is to get your attack surface in order. The Sweepatic External Attack Surface Management (EASM) Platform is built to help you with building cyber resilience. It lists, structures and prioritizes observations by criticality. 67%