Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A deep dive into investigating a complex denial-of-service attack

On April 19, 2024, Datadog’s US5 website (app.us5.datadoghq.com) started experiencing elevated error rates, though they were low enough that most of our users didn’t notice them. For the next few days, we worked around the clock responding to multiple episodes of this mysterious attack, which gradually unfolded as we investigated. We also implemented several measures to reduce the impact on our customers.

Enhanced Data Security and Regulatory Compliance With AWS Cloud + Protegrity

Protegrity is proud to partner with AWS, offering businesses like yours the integrations you need to start protecting data at the field level. With precision data protection through Protegrity and AWS, companies can start meeting regulatory compliance standards outlined with PCI DSS, GDPR, Nacha, or other compliance requirements. With regulatory compliance standards met, businesses can unlock opportunities in improved cloud migration, AI, advanced analytics, reputation management, and more. See how Protegrity’s data protection and partnership with AWS can take your organization to the next level.

What is Software Security? Importance, Techniques, Challenges and Best Practices

Software Security is the field mainly concerned with protecting software applications and systems against different threats or risks or the process of defending software applications or systems against various threats, risks, or attacks. It includes the various initiatives, methods, and safeguards to protect the software and data it processes from unauthorized access, alteration, or denial.

Applying a 'Three-Box Solution' to Identity Security Strategies

Physical and network barriers that once separated corporate environments from the outside world no longer exist. In this new technological age defined by hybrid, multi-cloud and SaaS, identities are the perimeter. Any one identity—workforce, IT, developer or machine—can become an attack path to an organization’s most valuable assets.

Phishing in Style: Microsoft Sway Abused to Deliver Quishing Attacks

In July 2024, Netskope Threat Labs tracked a 2,000-fold increase in traffic to phishing pages delivered through Microsoft Sway. The majority of the credential grabbing pages investigated used “Quishing,” a form of phishing that uses QR code to trick users into accessing a malicious website. The phishing campaigns targeted MS Office credentials, using documents to bait users into logging in.

The Problem with Disjointed Cloud Migration Journeys

Organizations start their cloud migration journey with high hopes for more speed, agility, and innovation. But often, these hopes fall short. Instead of achieving a seamless, cloud-powered enterprise, companies end up with fragmented cloud projects, data security risks, and unpredictable spending. This scattered approach can stall cloud initiatives and prevent organizations from fully benefiting from the cloud. Let’s take a look at some of the impacts and risks.

7777 Botnet - Insights into a Multi-Target Botnet

Over the last month there have been some updates about the mysterious 7777 botnet—which was first mentioned in this post in October 2023. Until now, it was known that the botnet was made up of TP-LINK routers and that it was being used to execute very low volume and controlled brute force attacks on Microsoft 365 services targeting corporate accounts. In our continuous efforts to have all sorts of malware families under our radar, the 7777 botnet is no exception.