Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top Security Threats Worldwide Q1 2024

Join WatchGuard CSO Corey Nachreiner and Security Engineer Trevor Collins as they discuss key findings from the WatchGuard Threat Lab’s Q1 2024 Internet Security Report. You’ll learn about the latest malware trends, like network-based detections dropping almost 50 percent, but endpoint detections rising over 75 percent. They’ll also cover the top network exploits, illustrate a common phish our DNS firewall blocked, and much more.

De-Risk Technology Transitions and Save Money with Trustwave

With all the issues happening in cybersecurity technology lately, such as CrowdStrike’s software update that caused massive outages worldwide last week, it behooves all organizations to take a serious look at their security stack with an eye toward paring it down to help reduce your threat landscape.

Sysdig Threat Research Team - Black Hat 2024

The Sysdig Threat Research Team (TRT) is on a mission to help secure innovation at cloud speeds. A group of some of the industry’s most elite threat researchers, the Sysdig TRT discovers and educates on the latest cloud-native security threats, vulnerabilities, and attack patterns. We are fiercely passionate about security and committed to the cause. Stay up to date here on the latest insights, trends to monitor, and crucial best practices for securing your cloud-native environments.

The impact of quantum computing on PAM: Preparing for the future

Quantum computing is poised to revolutionize the world. From simulating atoms and molecules to mapping and modeling in medicine, the potential use cases are vast and still unfolding. It may seem far on the horizon, but for those in cybersecurity, especially privileged access management, now is the time to start planning.

How To Use Tanium To Respond to the Australian PSPF Direction 002-2024 (Technology Stocktake)

On July 8, 2024, Australian Home Affairs Secretary Stephanie Foster issued a series of formal directions under the Protective Security Policy Framework (PSPF) instructing each federal government body to identify and mitigate potential cyber risks amidst rising concerns for foreign interference.

Threat Actor Uses Fake CrowdStrike Recovery Manual to Deliver Unidentified Stealer

On July 22, 2024, CrowdStrike Intelligence identified a Word document containing macros that download an unidentified stealer now tracked as Daolpu. The document impersonates a Microsoft recovery manual.1 Initial analysis suggests the activity is likely criminal.