Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Attackers Abuse URL Rewriting to Evade Security Filters

Attackers continue to exploit URL rewriting to hide their phishing links from email security filters, according to researchers at Abnormal Security. URL rewriting is a security technique used by many email security platforms to analyze links in emails to verify their safety before users are allowed to click on them. However, this technique can also be abused to mask the original phishing link.

The Key Advantages of Implementing Security Analytics

Taking proactive actions regarding the security of your systems is a fundamental part of all organizations. It's impossible to predict what cyber attacks or incidents your organization may face but there are solutions and options available to you that assist in detecting threats before they can impact your organization. One of these valuable solutions is security analytics.

SenseOn MDR vs. SocGholish: A Technical Analysis

In February of 2024, SenseOn was contacted to assist with investigating suspicious activity on a customer’s estate. SenseOn analysts quickly identified a malware infection and identified the variant as SocGholish. This blog will showcase SenseOn’s detection and response capabilities against the malware and a breakdown of SocGholish’s techniques and that of the threat actor observed.

Docker Zombie Layers: Why Deleted Layers Can Still Haunt You

Docker Zombie Layers are unreferenced image layers that continue to exist for weeks in registries, even after being removed from a manifest. In this hands-on deep dive, we explore how these layers can persist in registries and why ensuring the immediate revocation of exposed secrets is critical.

Jonathan Freedman Appointed Head of Information Security at The Cyber Helpline

We are excited to announce that Jonathan Freedman has joined The Cyber Helpline as our new Head of Information Security. With over two decades of experience in Information Technology, Enterprise Architecture, and Cybersecurity, Jonathan is dedicated to safeguarding the digital landscape. He currently serves as the Head of Information Security at London law firm Howard Kennedy, where he leads the Cybersecurity Team.

SOX Compliance: What Is It and What Are the Requirements?

Unfortunately, it will often take some kind of disaster in the business world before a government takes action to prevent it from happening again. It’s only when significant data breaches happen that states implement compliance laws to avoid mishandling data; in this case, SOX compliance has a similar backstory. In the early 2000s, the collapse of corporate giants Enron, Tyco, and WorldCom exposed flaws in corporate accountability, leading to widespread fraud and massive investor losses.

Why you need risk-aligned cyber security to build resilience

Despite significant investments in cybersecurity technologies and services, many organizations remain vulnerable. One of the myriad reasons is the lack of alignment between cybersecurity strategies and specific risks each organization faces. This is where risk-aligned cybersecurity comes into play, ensuring that defenses are tailored to the unique challenges and threats an organization faces, ultimately building greater resilience.

Don't Treat DAST Like Dessert

Dynamic Application Security Testing (DAST), sometimes referred to as “pentesting in a box”, tests running code for a variety of issues that can’t easily be found by analyzing code with static scanning tools. DAST tools are platform and language agnostic—as long as you have a website or API they can connect to, they’ll get the job done, and find real vulnerabilities in the same places an attacker would.

Stay Ahead of Ransomware: Comprehensive Solutions against DragonForce Attacks

In the ever-evolving landscape of cybersecurity threats, the DragonForce ransomware group has quickly become a serious menace to organizations worldwide. First discovered in August 2023, DragonForce has made headlines by leveraging two powerful ransomware variants—a fork of the infamous LockBit3.0 and a modified version of ContiV3.

SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management

After almost a decade in business, we’ve had the opportunity to watch the software development industry change dramatically. Developers work with more moving parts than ever, relying on technologies like third-party resources and AI coding assistants to release sophisticated software on tight deadlines. While we’ve been talking about the relationship between development and security for the past decade, the DevSecOps conversation has shifted quite a bit.