Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

The 443 Podcast - Episode 307 -How To Deanonymize the TOR Network

This week on the podcast, we discuss how German law enforcement managed to deanonymize and arrest users on the TOR network. After that, we discuss why the US government is trying to ban Chinese-manufactured car hardware. We then end with a cool research article on chaining open redirect and iframe issues into a 1-click vulnerability that grants attackers access to arbitrary Google Docs files. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Zero Trust Models Against Emerging Threats

Cybercriminals have become more sophisticated than ever and have access to many tools to carry out their attacks. It's important to understand that cybersecurity is not a one-and-done task, but rather an ongoing process that requires constant assessment and improvement. This is why the cybersecurity industry is evolving rapidly, embracing new protection methods that integrate AI-powered technologies and services to automatically detect threats and stay one step ahead of advanced attacks.

#153 - Unpacking the hacker mindset with Ken Westin, Senior Solutions Engineer at LimaCharlie

On this episode of The Cybersecurity Defenders Podcast, we unpack the hacker mindset with Ken Westin, Senior Solutions Engineer at LimaCharlie. Ken is a seasoned thought leader in cybersecurity who has spent years analyzing and understanding the intricacies of cyber threats and the methods behind them. Ken has a unique ability to identify emerging trends in the industry and for figuring out how businesses can protect themselves before they fall victim to attacks.

The 443 Podcast - Episode 306 -Kicking EDR Out of the Kernel

This week on the podcast, we discuss Microsoft's recent Windows Endpoint Security Ecosystem Summit and what it means for the future of endpoint security on the Windows platform. After that, we cover a research post on a malware campaign using Google Sheets as a command and control channel before ending with a chat about the US federal government's push to classify cybersecurity as a national service role.

Understanding the Differences Between DORA and NIS 2

Two significant pieces of European legislation stand out as cybersecurity regulations evolve: the Digital Operational Resilience Act (DORA) and the NIS 2 Directive. Both aim to enhance cybersecurity but target different sectors and have distinct objectives and requirements.

Hunting with the LimaCharlie Query Console - Webinar

Managing various data sources and retaining data can be a hassle for SecOps teams. LimaCharlie removes this headache by providing one-year of telemetry storage for any data type - EDR, cloud provider logs, authentication logs, and many more. This allows your organization to preserve a valuable source for threat hunting and anomaly detection. Watch this webinar where we explore LimaCharlie’s Query Console, and learn how you can structure queries to quickly hunt through any historical data set, find value, and uncover hidden gems.